WO2000078057A1 - Logiciel trac programmable, modulaire, utilisable et securise - Google Patents

Logiciel trac programmable, modulaire, utilisable et securise Download PDF

Info

Publication number
WO2000078057A1
WO2000078057A1 PCT/US2000/016381 US0016381W WO0078057A1 WO 2000078057 A1 WO2000078057 A1 WO 2000078057A1 US 0016381 W US0016381 W US 0016381W WO 0078057 A1 WO0078057 A1 WO 0078057A1
Authority
WO
WIPO (PCT)
Prior art keywords
pfn
data
equipment
trac
ofthe
Prior art date
Application number
PCT/US2000/016381
Other languages
English (en)
Other versions
WO2000078057A9 (fr
Inventor
Richard C. Walker
Original Assignee
Kline & Walker, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kline & Walker, Llc filed Critical Kline & Walker, Llc
Priority to AU57384/00A priority Critical patent/AU5738400A/en
Publication of WO2000078057A1 publication Critical patent/WO2000078057A1/fr
Publication of WO2000078057A9 publication Critical patent/WO2000078057A9/fr

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/10Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
    • B60R25/102Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device a signal being sent to a remote location, e.g. a radio signal being transmitted to a police station, a security company or the owner
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/01Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens
    • B60R25/08Fittings or systems for preventing or indicating unauthorised use or theft of vehicles operating on vehicle systems or fittings, e.g. on doors, seats or windscreens operating on brakes or brake systems
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/302Detection related to theft or to other events relevant to anti-theft systems using recording means, e.g. black box
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/305Detection related to theft or to other events relevant to anti-theft systems using a camera
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R25/00Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
    • B60R25/30Detection related to theft or to other events relevant to anti-theft systems
    • B60R25/33Detection related to theft or to other events relevant to anti-theft systems of global position, e.g. by providing GPS coordinates
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/20Communication devices for vehicle anti-theft devices
    • B60R2325/205Mobile phones
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B60VEHICLES IN GENERAL
    • B60RVEHICLES, VEHICLE FITTINGS, OR VEHICLE PARTS, NOT OTHERWISE PROVIDED FOR
    • B60R2325/00Indexing scheme relating to vehicle anti-theft devices
    • B60R2325/30Vehicles applying the vehicle anti-theft devices
    • B60R2325/304Boats
    • B60W2550/402

Definitions

  • PCT/US99/00919 filed January 15,1999 (1 10273.202); U.S. Patent Application No. 08/975,140, filed November 20, 1997 (1 10273- 100); and PCT International Application No. PCT/US 97/21516, filed November 24, 1997 (1 10273-100) all of which are hereby incorporated by reference.
  • the PFN is described as a hardware device that is called a protected primary focal node that ultimately can be placed almost everywhere or on anyone to perform accountable remote monitoring and control including for vehicles, machines, and equipment.
  • PFNS personal PFNS
  • tracking, physical telemetry and remote control use for personal PFNS to help manage and control provisionally free individuals and or animals by the appropriate protocols and authorization.
  • all PFNS are designed to monitor accountably from a secure environment, and provide aggressive remote control capability to equipment and people in any physical environment.
  • PFNS will include any and all actions of machines and or man for the purpose to acquire specific data on conditions perform activities or functions; and to record this data on location, as well as, report it back redundantly to any appropriate concerned individuals, and or the public in general through wireless and wired communications via computer networks and made accountable through data storage systems.
  • This can be a closed circuit monitoring and remote control systems, and or one that is networked either publicly or privately on a larger scale. It may utilize or include in many cases the World Wide Web for inexpensive mass access and handling of data, which can be provided with medium to relatively high commercial security protocols through this technology's software innovations and Commercial Off The Shelf C.O.T.S. products. Running in any PFN/TRAC System.
  • the PFN/TRAC system is designed to couple with existing technologies and provide protection and accountability and to augment any system with a full array of tracking products, audio, video and varied sensing devices as well as activity controls and innovative actuators to perform many task remotely.
  • TRAC Trusted Remote Activity Controller
  • PFN the protected primary focal node
  • TRAC a most unique and ideal software modality, that can be used as a universal program and or a standard, to format accountability for aggressive remote control.
  • the technology will seek endorsement by the insurance industry to provide trusted accountability in the liability assessments and rate assignments for aggressive automated and remote control in any scenarios.
  • the remote control accountable software for tracking will require personnel Identification, electronic serial numbers ESNS, from the transmission equipment used, GPS, and stationary systems may use land line numbers and coordinated addresses, etc., and or any other locating systems data to be converted from a data signal at the application level in the end user computer to place an object on a calibrated map as latitude and longitude coordinates.
  • TRAC system in the PFN is a modular and programmable system that will authorize and authenticate commands and activities for aggressive automated and remote control with local and remote redundant memory systems. This is how this technology plans to provide a trusted remote activity controller to provide accountability to obtain approval from the public, insurance, industry and government.
  • the manufactured commercial products employing this technology's PFN and or TRAC systems will be responsible for obtaining any and all certification proof testing in their design, construction and applied use, as well as, indemnify the inventor and the primary assignees Kline Walker LLC for any damages or liability in any exploitation of this technology and it's related innovations.
  • the PFN/TRAC System is designed to win approval in industry and government standard efforts for performing accountable remote and automated control.
  • the technology is also designed to incorporate all other automated control and communication technologies in this process to form a well organized web of local protected accountable interface platforms that can create a machine messaging set of networks (integrated as needed) on a global scale to better manage man and machine along with the world environment.
  • the goal in developing the PFN/TRAC system is to provide a real-time data acquisition and management system to promote trust and cooperation in the world's populous for the sensible use of technology and resource by managing the negative impacts on society, economy and the environment thereby sustaining civilization with more freedom, responsibility, fair play, safety, and improved health for the best personal pursuit of happiness in all societies.
  • the mass of all data collected in real time for first level temporary memory shall be controlled by being erased in a re-writable memory and not stored in the permanent memories (local) if deemed unessential by application specific onboard firmware and/or software criterion, and not reported redundantly to any remote location unless countermanded by the off board monitoring and control systems, e.g., TRAC/FACT FTP, CEW etc. defined in the body of the text).
  • TRAC Trusted Remote Activity Controller
  • Figure Al is a cover sheet for the PFN/TRAC system showing the four main areas of involvement; Control Security Technology, Mobile Management, Home Management, and Commercial Management.
  • Figure 1 is displaying the Trusted Remote Activity Controller TRAC and describing the software protocol to create the accountable system for remote control and management.
  • Figure 2 is a more in-depth breakout and description ofthe many application specific programs that will run in the PFN/TRAC System either in universal diverse PFNS or application specific PFNS.
  • Figure 3 shows the two basic different communication PFNS which are one way communication systems with only local real-time event memory storage for accountability and two way systems that provide a redundant remote memory storage.
  • Figure 3A is a continuation ofthe one and two way PFNS and is a chart that details the properties and qualities ofthe communication devices used in the PFNS.
  • Figure 4 details the physical architecture and hardware components of one way communication PFNS that will run the later detailed software programs of TRAC.
  • Figure 5 details the least expensive two way communication PFN system (two way paging) hardware component architecture for the PFN/TRAC System.
  • Figure 6 is the most sophisticated ofthe PFNS and it is the two way RF or Cellular or wireless telephony communication system capable of carrying real-time video to a remote location as a major attribute.
  • This drawing is ofthe hardware component architecture utilized to construct these PFNS and TRAC system.
  • Figure 6A is a Figure showing the progressive evolution ofthe PFN/TRAC hardware architecture designed into the PFN/TRAC system to keep it current as a future technology.
  • Figures 7 and 7A are but some of a group of similar drawings that appear through out all the PFN/TRAC applications showing the classic double wall physical structure ofthe encasement that protects the PFN/TRAC node.
  • the architecture in the same but the materials and configuration changes per application specific structures are going to be part of a standards effort even though the PFN/TRAC systems have addressed and created certain configurations for certain applications. (Note PFNS can be secluded or protected or both and protected differently than this set of configurations.)
  • Figure 8 was of one ofthe first add-on PFNS for credit card billing and charging in real time for cabs and mobile applications, it is an earlier version ofthe PFN stop and control box but is shown in this application as a unit that would run TRAC software programs and use Financial Transaction Products as detailed in the TRAC system software.
  • Figure 9 is a first drawing of a one way pager encasement to protect the interface and memory for the original stop and control box. The two way pagers can be housed in tight of a configuration as well with different programming
  • Figure 10 is a illustration of a PFN encasement in the dash of an automobile with connectable interfacing on a pager systems and cellular phones as well as a interfaced lap top.
  • Figure 11 shows the adjustable compartments and structure in side the car dash PFN.
  • Figure 12 is a 3 draw configuration for the car dash PFN hard ware detailing the possible components essential n the PFN and also the personally owned electronics array of personal items that can be interfaced.
  • Figure 13 is a diagram showing the different communication devices in the PFN and the card swipe magnetic reader for financial transactions, it also shows the three major types of wireless servers or providers for communications with the PFN/TRAC system, paging, wireless telephones and RF systems
  • Figure 13a is an enhancement of a earlier drawing for the universal PFN and it incorporates technology from 6a showing the unibus and some more consolidation of devices and systems.
  • Figure 14 is a drawing that details an electrical sealing system used to certify at least the event memory storage area in a PFN/TRAC system as untouched and that the one write memory is still in a pristine record state for evidence grade use.
  • Figure 15 is a hypothetical PFN encasement showing the state seal system and it's anchors in addition to the physical locking mechanism used to protect this area.
  • Figure 16 is a federal agency directory that supports web sites and has and will provide numerous gateways on to the Internet as well as to other isolated agency intranets and will be part of PFN/TRACS Federal Access and Control Technology FACT.
  • Figure 17 is a diagram showing many PFN/TRAC applications around the world and how it serves the public within formative web pages, the government structure for taxing and aid and the economy with commerce as well as the world environment as part of a gigantic machine messaging net work for monitoring, managing and controlling equipment and that equipment's impact. Not shown here are the personal PFN products.
  • Figure 18 is the Federal Access and Control Technology FACT called a chip here but can basically be in the form of any kind of hardware, software or firmware, and has as a main purpose to provide identification of a component and make accountable the component and user in the PFN/TRAC/FACT system and control that component in real-time by a series connectable registries from local to national and globally if so desired.
  • Figure 18A is a Figure ofthe PFNTRAC system running Federal access and control technology FACT programming.
  • Figure 18B details the government FACT registry down to the responsive component level.
  • Figure 19 shows the registries and wired wireless and IP links in an acceptable present day configuration as to the state of world affairs and trust. An area that hopefully can change and be more open with all nations.
  • Figure 20 shows how the FACT system software will accomplish new installs and reinstalls of components in to the entire system individually at each local PFN/TRAC node.
  • Figure 21 details a software flow chart on how FACT will be allowed to access individually owned PFN/TRAC systems openly and sets the parameters and guide lines for stealth access. As perceived by the author with respect to the constitutional right and respect for individual privacy. (This is only conceptual to explain the functions) public and government will set policy and laws then programming protocols will be set and application specific software will be written.)
  • Figure 22 is detailing the alert status of a component entered into the system that may be flagged due to national security, part recall, or theft etc. This diagram discusses how the software flow could go in some of these scenarios but once again this will be laws, standards and regulations all before the software commands are entered into and application specific hardware configuration
  • Figure 23 shows an earlier patent drawing for the personal PFNS and it is a universal application PFN showing various communication systems. In reality may be only one com link will be used to save space
  • Figure 23A is one ofthe personal PFNS using the Radio Frequency system of a walkie talkie.
  • Figure 23B is another communication modality for the personal PFN using 2 way paging protocols.
  • Figure 23B1 is an earlier Figure using reflex 2 way paging protocols to create personal tracking and PFNS.
  • Figure 23C is a cellular modality to transmit data for the personal PFN.
  • Figure 23 D incorporates a predicted communication development by the PFN technology and is a usable asset in the PFN/TRAC system.
  • Figure 23 E is the total configuration belt for many activities and different communication possibilities and uplinks. It is in no way all the modalities and uses of a personal tracking system or accountable PFN; but it is a good representation ofthe inventions possibilities.
  • Figure 24 is a diagram exploring many of the personal PFN systems and tracking devices.
  • Figure 25 is showing some ofthe most immediate equipment uses and areas.
  • a Primary Focal Node combines wired or wireless communications, processors, activity controls, sensors, audio and video telemetry in a physical, electrical, and legally protected interface platform constructed to provide accountable remote control and management through local and remote redundant memory storage.
  • PFNS Primary Focal Nodes
  • Security is provided through physical and electrical means.
  • Accountability is accomplished by secure local event memory storage and redundant remote memory storage to at least one remote location.
  • the PFN is designed to be a Trusted Remote Activity Controller TRAC termed by the technology as a PFN/TRAC System.
  • PFN/TRAC System has operational software and firmware termed TRACS.
  • TRACS is the base operating system name for the software programs running in the PFN computers or processors, including any connected remote monitoring, control or management systems, either for general PFN software applications or any application specific configurations. This software and it's functions are the main focus of this patent application.
  • PFN/TRAC System or device can perform as a primary activity control interface with individual human beings or animals or be a control interface on a piece of equipment as part of a remote control intranet web or be part of a much larger system like the Internet or the World Wide Web.
  • PFNS can act as repeating stations (either preprogrammed digitpeating or repeat analog signals) with other PFNS or other communication devices to create a flexible mobile and stationary web through preprogrammed protocols, that scan convert and route electrical signals from various wireless messaging devices and systems, to summon emergency services, interface with the Internet or perform application specific network tasks or activate any electrically controlled local activity in an accountable manner.
  • a basic quality ofthe PFN interface is to provide user friendly PLUG, PROGRAM, AND PLAY simplicity for the end user, with interactive controls, while addressing as much as practical forward and backward engineering possibilities to create a rapid commercialization of this accountable organizational component for machine messaging and wireless personal management scenarios, e.g.,using a machine messaging network in conjunction with the World Wide Web (MMNWWW)
  • MSNWWW World Wide Web
  • the PFN technology additionally includes Commercial Off The Shelf Products and C.O.T.S. interfaces to promote versatility and capability through the PFNS for quick accountable control and management scenarios in existing machinery and for updating and converting existing equipment and systems for other remote control scenarios.
  • C.O.T.S. interfaces to promote versatility and capability through the PFNS for quick accountable control and management scenarios in existing machinery and for updating and converting existing equipment and systems for other remote control scenarios.
  • Kline and Walker PFN/TRACK technology As part of Kline and Walker PFN/TRACK technology's nature and scope of invention, the consolidation and integration of circuit architecture for all components and accessories is specified in all the related patent application specifications to provide longevity in the market place and is considered an important and valuable asset to providing space and versatility for interfacing other technologies.
  • PFN Communication Mediums Include:
  • Radio Frequencies, and repeating or digitpeating technology and protocols Pager Frequencies and protocols with accompanying Commercial software and hardware Systems, Cellular Phone Frequencies with wireless phone protocols, software and hardware considerations and accompanying Commercial Systems for Satellite or RF, or wireless telephony, and TV, both commercial and governmental, all bands including L Band (military), Cable TV, IP protocols, land line (telephone ISDN, fiber optic and all data routing systems), as well as Internet providers and servers.
  • L Band military
  • Cable TV IP protocols
  • land line telephone ISDN, fiber optic and all data routing systems
  • Personal PFN application specific uses include (e.g., first products offerings and markets). Personal tracking and telemetry products in the form of belts bracelets collars, article of clothing, personal items purses, brief cases, mobile offices, multi tasking communication and personal computers, organizers, palm tops or locating products, physical implants, with remote control applications for nursing and policing.
  • Health care telemetry with prescribed remote treatment and patient management, child monitor or care and protection e.g., school link, camp view, ski seeker, passenger pointer to locate crash victims, boat, plain train and auto, the conditionally free for parolee guidance, management and control-victim protection and peace of mind, Animal Shepherding, Pet and animal location management and or controlled, farming, live stock telemetry, or Crowd control policing- guidance and management directional aids, or marshal law, incarceration scenario, head count, identity checks, public safety and accountable aggressive security controls nation building with peace keeper function to be coordinated with Equipment PFNS which are accountable machine messaging net work nodes.
  • Equipment PFNS which are accountable machine messaging net work nodes.
  • Equipment PFN applications include (not a complete description of PFN products or involvement): Environmental sensing and monitoring for local and global impact to determine policy and change, as well as determine, availability, quantity, cost, profit, tax, or penalties for good management of resources, and energy, with more ofthe same for all commercial and private machine use, including remote operation, and automated repair or diagnosis, augmentation of accessories in; agriculture, e.g., tractors and farm machinery, construction, earth movers, etc., industry/manufacturing, e.g., production or material handling equipment, and transportation/vehicles e.g., smart car systems and interactive highways, cars, trucks, buses, or rail systems trains, trams or on the water, boats/ships and aviation as well to perform auto-tutor and emergency control and management functions during human operational learning curve periods, to automate military equipment, nation building, national security uses, governmental assessment of equipment use for tax to support society's infra- structure, highways, bridges, etc., private and home use for combined utility, security, public safety
  • TRACS accountable modular and programmable software termed TRACS that authorizes and authenticates commands from wireless and land line telephone and or RF equipment and or light transmission technologies to remotely activate and confirm automated controls and functions through processors controllers and or computers.
  • TRACS processes this data in a secure manner it stores it in a protected storage on board a piece of equipment in this technology's PFN on location and in the case ofthe two way transmission PFNS it reports it back to at least one remote location for a redundant memory storage.
  • the PFN/TRAC system was designed to distribute communicated commands to their appropriate application specific preprogrammed protocols while authenticating the authorizations and preserving and accountable record on both sides ofthe remote control communication and through out any redundant transmissions or data storage that is interfaced and networked.
  • the TRAC system of software has been designed to develop a Trusted
  • Remote Activity Controller for all of societies needs regarding accountability and liability as well as to preserve an organize secure modalities to mange and control automated equipment, and financial legal transactions.
  • the PFN/TRAC invention's base objective which has been stated redundantly though out the PFN applications is to incorporate present, past, and future modalities by providing flexibility in constructing PFNS out of existing technologies and to establish an organizational platform to perform accountable local interfacing.
  • the progressive consolidation of these devices, components modalities are well documented in PFN applications and all fall within the nature and scope ofthe invention.They are meant to be inclusive in the specifications and in the claims ofthe PFN invention and to deter proprietary development. This was done deliberately to draw all manufactures into a cooperative effort to organize and standardize an accountable interface platform and system for accountable machine messaging robotics and remote control and management.
  • Figure Al is a Overlay Sheet for PFN/TRAC Technology PFN/TRAC Remote Management Systems. This is not a Figure as much as it is a cover sheet for the technical
  • the PFN/TRAC System is at the center of four basic areas involving machine messaging. It is there in two ways, first locally in the form of a physically protected remote control interface platform with accountable memory and second as shown here intrinsically as a center for control and management of these four areas. Which uses the PFN/TRAC System of networks to monitor and perform individual or mass control or management functions through a Machine Messaging Network both separate and connected to the World Wide Web or Internet.
  • Part ofthe PFN/ TRAC System is a nationally operated Registry termed the Federal Access and Control Technology FACT that is explained in greater detain in this application but provides all governing agencies their own special communication ID's and access in all four areas, but with special protocols to protect and respect individual privacy protect and serve the individual and the public while providing controls for any "big brother abuse” ref. books (1984 & Brave new world). The same is true for commercial interest, organizations as for individuals. The use, development and deployment of PFN/TRAC devices and any monitoring and management system has deliberately been designed in the spirit and scope of a complete real time democracy.
  • the design is also structured to be developed through the United State constitutional guidelines and guarantees as provided by the bill of rights to the individual citizen, while providing an organizational structure for the merging technologies of communication, computers remote control and robotics in data acquisition. It is also designed to coordinate and organize agency services and responses to increase public safety and national security.
  • the system has been designed to help control, criminal activities and manage the use of equipment, while appraising environmental and infrastructure impact as well as provide individual assistance and services to those in need. (Application specific for personal PFN/TRAC devices and Equipment PFN/TRAC devices). Both personal PFNS and
  • Equipment PFNS are used in all the same areas and also utilize much ofthe same components and communication systems, but are provide different arrays of sensors, activity controls and actuators.
  • the top left ball for control security is remote control and management with the highest security functions for private, commercial, and governmental applications and is covered extensively in the earlier related applications. This area would have a great deal of local FACT registry contact in the commercial, and individual applications and the DOD and national security agencies would have their respective involvement as well as the military in their application specific areas.
  • the right top ball is for home management and will be responsible for home security, utility use, remote equipment repair diagnosis, supporting a local repeating center and beacon (application specific for all PFNS), home security, interactive with wire and wireless appliances, family safety, sense fire or panic situations and contact the correct assist personnel, etc.
  • the Trusted Remote Activity Controller provides all local vehicle or device control and event storage relative to PFN (Primary Focal Node) operation. It interfaces to an RF telemetry link, which may consist of a one or two way paging system. More sophisticated links could be used such as digital cellular or PCS (Personal Communication System).
  • RF telemetry link which may consist of a one or two way paging system. More sophisticated links could be used such as digital cellular or PCS (Personal Communication System).
  • a Remote Management System (which may be as simple as a single page, or as complex as a controlling PC or Server) initiates a TRAC function, such as an automated slow, stop and secure sequence. The signal or paging command is received securely (via encryption) and decoded by the TRAC.
  • a local display or audio speaker may provide local status ofthe TRAC function being executed, with appropriate progress tones, voice queues or displays to provide a local operator feedback relative to the progress ofthe function.
  • all activity controls are initiated by the TRAC and monitored by the TRAC from start to finish. This is accomplished through feedback sensors.
  • Feedback Sensors may be electrical, mechanical, fiber optic, infra red or other technologies. Since the function being performed requires a high level of accountability and trust that the sequence was in fact executed properly, every step ofthe process is monitored through appropriate feedback sensors to attain the reliability and trust required. This positive feedback in the TRAC is the key feature which distinguishes the TRAC from other electronic or software controllers; making it a fully "trusted" system for the task being accomplished.
  • System Function Data This is termed the System Function Data.
  • Interim progress ofthe sequence, activity or function may be optionally transmitted back to the remote management system through a 2-way phone or paging link. This may occur as the function is executing or may be programmed to occur after completion ofthe sequence. In any event, local, redundant storage ofthe event is always contained within the PFN for subsequent or simultaneous retrieval of event information and proof for accountability purposes. The PFN enclosure and TRAC monitoring of tamper sensors guarantee the information has not been compromised. Other types of information along with the System Function Data may be stored in the TRAC Local Event Storage Memory. This auxiliary information may include digital or analog data not directly related to the function being monitored and executed, but important for evaluation and determination of liability, collection of evidence or environmental data. Examples of these include road condition information or surveillance audio and/or video.
  • TRAC implementation may be accomplished in many ways, depending on space or funding constraints and level of integration required for the system.
  • a PC-based system may be in the form of a desktop system, laptop, palmtop or embedded system (PC 104) with a dedicated DOS or Windows based TRAC program, consisting of machine language, Basic, C, C++, Visual Basic, Visual C or C++, or other high level language which accomplishes the TRAC function through software control.
  • Interfaces to the System Under Control (SUC) may be accomplished through appropriate I/O cards, either analog or digital.
  • PC compatible Modems or Cell phone interfaces provide the interface to the Remote Management System (RMS).
  • RMS Remote Management System
  • SUC and RMS interfaces may be in the form of ISA, PCI, PCMCIA, VME, Compact PCI, Future Buss, or other commercial interfaces compatible with the PC-based system used.
  • More compact and custom implementations of the TRAC may consist of dedicated state machine controller implementations in which TRAC functions are executed through embedded firmware. These implementations may incorporate multi-chip solutions using EPROM or EEPROM interfaced to Arithmetic Logic Units (ALU), I/O ports and discrete memory elements. They may also be microprocessor or microcomputer based. A large variety of board level products are commercially available for such an implementation. Single chip or high density implementations might consist of Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC) based devices.
  • FPGA Field Programmable Gate Array
  • ASIC Application Specific Integrated Circuit
  • Display, Video and Audio (Auxiliary Data) for the TRAC can be in many forms and types. These may range from analog systems, in which tape or other magnetic media store the analog signal, to digital systems in which data is stored on hard disks, EEPROM or RAM. Data format may be modulated through FM or AM, compressed, packetized or otherwise encoded for reduced bandwidth or for transmission over the Internet (packet audio and video).
  • TRAC This second Figure of TRAC is " a more detailed description of this technology's proprietary programs interfaced in the programmable and modular TRAC, for mobile management, commercial management, home management and the control security technology applications detailed throughout the related patent applications.
  • ASS Application Specific Software programs
  • This software is programmable and modular.
  • the TRAC software can be in the form of hardware with embedded software or firmware, or it can be modular software running in processors controllers and or computers (these applications and product directions will be determined by engineering preference at the time of manufacture or any current owner of a PFN as applicable by how flexible the PFN architecture is.
  • the Software/Algorithms will accommodate Bank and stock exchange Transaction products, which will be supported by this technology's FTP Financial Transaction Program (C.O.T.S. or Proprietary).
  • C.O.T.S. or Proprietary FTP Financial Transaction Program
  • This program will do as much as possible to support run and route any C.O.T.S. products best suited to the owner ofthe host equipment and their choice of commercial servers, but eventually all programs will meet certain securities exchange and banking standards.
  • This technology plans to utilize Commercial: 128/64 bit Encryption for Web Transactions with the present proprietary software program to support and interface most ofthe secure commercial exchange products with all the pretty good protection PGP software C.O.T.S. products available today.
  • This Program is labeled Commercial Encrypted for the Web (CEW).
  • FACT is the federally authorized control technology or access and control technology protocol and or standard. This program will take priority over all running programs on any PFN equipped piece of machinery equipment and or vehicle. It will be used by law enforcement and authorized government agencies for national security and public management and or crowd control in extreme cases such as, a declared state of marshal law. It will be a priority system over all host equipment functions including financial transactions to insure fair and stable pricing in providing necessities in a ravaged and or compromised area. The financial record can be reviewed later to determine any improprieties exploitation's, and or profiteering that occurred and is so prevalent in these kinds of circumstances, where black markets and improprieties create a lack of trust and disharmony between warring factions. These are nation building functions and extreme Control Security Technology applications.
  • FACT will also be responsive to special reserved RF radio signals for police and official government access as well as be responsive to specific coded and encrypted messages sent and received on any frequencies including digital and analog signals and ID protocols (specific address Electronic Serial Numbers, ESN, etc. This is to allow immediate individual, identification communication and control of a vehicle it's PFN interface including all equipment or components as well as any host equipment electrical system and the same level of control for all area PFN vehicles and equipment in an emergency.
  • ID protocols specific address Electronic Serial Numbers, ESN, etc.
  • Another base function ofthe FACT is to perform integrity checks of PFN components interfaced to make sure they are licensed products that are interfaced are not reported stolen products or that the PFN is not attached to a stolen host product through a special FACT chip or embedded program in each component/device. This is accomplished as a review process performed by the FACT registry that is detailed in Figures 18, 19, 20, 21, and 22. Each time the PFN installs a new component (performed locally by fact embedded firmware program), which is part of a manufacture FACT registry responsibility.
  • This variable use value tax structure provides revenue for states or regional governing bodies for a new component is used in their location, as well as resale products with no inconvenience to any individual seller. This should prove more profitable and accurate than collecting sales tax only on new product sales either on the Internet or in area stores freeing up both for communication and commerce.
  • PFNS provide a mechanism for real-time use taxing and real-time impact and assessment on societies infrastructure and their environment.
  • the local PFN/TRAC system is in a secure encasement with local memory and remote redundant memory and designed to perform at a triage level providing; accountability and analysis of any event as well as make it easier and more instructive to use PFN equipped machinery or PFN assisted personal activities or monitoring in the future.
  • FACT program will be accessible by the police, law enforcement, and or traffic enforcement system and police remote control command tools, that are capable of locally identifying a vehicle and controlling a shut down of that vehicle in the manner well detailed in earlier related PFN and Stop and Control Box applications for this technology's proprietary "spider eyes program" or for any smart car and or interactive highway programs.
  • FACT will also, provide varying degrees of security protocols all the way up to and including DES data encrypted standard at certain levels for any and all equipment if so determined necessary in the legislative process or in a special uses format for national security or military applications around the world.
  • This technology provides for the use of broad governmental management and control through a modular modality to be deployed physically in chips and or activated as pre programmed software/firmware in any PFN processor or PFN interfaced processor, for special situations as authorized and agreed upon by the appropriate governing bodies for domestic civil situations and or world peace treaties to insure fair treatment and management in these hostile situations, where terms of an agreement or contract have to have some form or mechanism to provide mutual fairness (where TRUST among parties is deficient).
  • Federal Access Control Technology has been designed to be set up and governed by the United States democratic process as a master control standard for this technology's machine messaging network and to include the world wide web to comprise an MMN on the WWW.
  • FACT Federal Access Control Technology
  • each stable nation state would posses their own encrypted control code for national security and also have their own security protocols for sensitive data processed by any PFN through TRAC software system and or communicated on the MMNWWW.
  • Data transfer and availability would be governed by it's sensitivity and in some cases would only be handled as it is today on intranets, L band military channels, etc., but still monitored and managed by high security PFNs.
  • any agreed upon accords or treaty measures could be written into software programs and downloaded into PFNs with this TRAC software to monitor and remotely control and or use robotics to referee the terms of any agreement.
  • the PFN/TRAC system can be installed and or activated in any and all equipment to help in the processes of nation building to insure fair exchange between the warring parties and to insure any aid efforts are guaranteed to be utilized in the fashion intended.
  • the management and control systems can serve to better follow the actual behaviors ofthe agreed upon hostels with out interfering or intervening or introducing any other new groups (Troops, etc.) or societies directly into a localized conflict.
  • the PFN/TRAC system can be given a progressive array of tools to help safe guard any agreed upon peace.
  • This technology can give audio instructions in the appropriate language and repeat or site the agreed upon terms when they are violated. This accomplished by the monitoring of improprieties with the hostile parties and or persons.
  • the technology will record incidents on location and in the remote monitoring and control center. It can then aggressively intervene from the authorized monitoring and control centers with varied levels of deterrents all the way up to full lethal weapon deployment and use.
  • All these actions are tracked and stored in memory systems both on board the PFN and redundantly in a plurality of remote locations e.g. (locations or sites agreed upon by the signers ofthe treaty). Accessory deterrent systems type, application and real-time use can involve all signing parties or leaders simultaneously along with their real-time communication to the involved masses. In Normal PFN/TRAC operations.
  • CEW Federal Access and Control Technology FACT
  • Commercial Encrypted Web products CEW e.g., TRAC programming or PGP C.O.T.S. products, or Financial Transaction products FTP NCR or the new wireless programs as C.O.T.S. products or TRAC programming
  • This primary programmable TRAC module software will prioritize communication from the communication links as determined by the standardization efforts for accountable remote control as per application specific protocols and real life social economic and environmental circumstances for this real time management system.
  • Local memory storage and time are both kept as part ofthe TRAC programmable module as well as, the application specific programs for management and control of society and it's equipment.
  • the Mobile Management would have application specific programs for remote piloting of a vehicle. (RPV). And most especially this technology's proprietary PASSS program, which stands for proprietary automated slow, stop and secure the vehicle. And the secondary modality ofthe this proprietary automated shut down PAGSSS proprietary automated guide, slow stop and secure. This of course can in part be accomplished through remote control if so desired.
  • M-ASMP stands for mobile application specific management program. This is any number of basic programs that are now completed by OEM PCMs that will be monitoring vehicle sensors and operating activity controls, as well as, accessory sensors and additional controlled devices made accountable through an interfaced TRAC equipped processor in a PFN.
  • C-ASMP Commercial Application Specific Management program
  • C-ASMP is designed to provide specific service data and remote analysis functions, as well as, control any machinery or equipment from at least one remote location and or to shut it down for emergencies or in accordance with any financial arrangement, leasing, taxing, etc.
  • monitored is any environmental data, or any application specific data like fuel or energy use or resource use water, air, etc.
  • H-ASMP is another application specific set of programs that can offer home nursing telemetry for specific physical conditions, it can be the control center for all utility use and services, it can communicate with short range communication PFN systems as detailed through out the other related patents, provide an interface point for diagnosis and repair of household appliances with FACT and smart card electronics either by short range RF signals or hard wire connectable.
  • these systems can be used for commercial applications in factories to operate an Intranet and perform Internet activities to lessen the cost of transmitting data all at the discretion ofthe owner or governed by any agreed upon contract or governing authority.
  • the containment will house the standardized TRAC Software in a processor and or any and all accompanying IC chip sets for pager cellular phone, RF circuits, and GPS. And or interface any current C.O.T.S. communication products or devices through the modalities detailed throughout all this technology's related patent applications.
  • This versatility will be replaced with universal interfaces, components and structures as a progressive accountable focal node for all automated and remote control functions is created for these specific applications and in the areas on mobile management, home management, commercial management, control security technology.
  • the drawing also illustrates monitoring, remote control and or management systems from the local level to the global level.
  • This Figure is utilized in other related applications 202 and 300.
  • the 300 network displayed at the top ofthe Figure three is the basis and structure for 1100 and 1200 series monitoring and control systems.
  • This networking can support this technology's "green eyes” and “spider eyes programs” at varying levels of public involvement and acceptance with varying levels of security, either as part ofthe Internet or in part as isolated networks interfaced with the web protected behind fire walls.
  • the data and its use will be determined by the public, it's governing bodies, processes and agencies to set the appropriate rules, regulations, laws, specifications, codes and standards, for any Internet and or world wide web engagement and the equipment use.
  • this machine messaging network MMN interfaced with the web WWW and utilizing the detailed communication systems of phone nodes, modems RF equipment interfaced with gateway computers can provide all the secure connectability for servers and providers to commercially full fill all the above detailed primary and sub programs desired to be run in a PFN/TRAC module in any manner prescribed by any and all governing laws, rules and regulations to insure accountable remote and automated control and or management.
  • the top local section 108 or 1208 in the 300 patent application is one remote storage but a plurality of memory storage is possible and probable in many applications throughout any networking.
  • the Figure also shows all the qualities and peripherals, as well as, the security systems for conditioning any two way transmissions.
  • C.O.T.S. products to condition a data signal
  • this technology will attempt to accommodate any and all hardware embedded software, and software encryption programs as possible to provide greater commercial and security options for any signal from a PFN.
  • the many products will be named in an appendix to this application and the this technology will do everything it can to cooperatively develop joint ventures in an effort to expand this technology and others to increase world stability through good management ofthe socioeconomic environmental interaction between man and machine.
  • the two directional dotted line on the right represents two way transmissions and has the letters DES on the left side which is an anchormen for Data Encryption Standard and PGP on the right which is an anchormen for Pretty Good Protection.
  • DES is a protected government technology that has specific hardware, for high security data. The software or embedded firmware for the government is handled strictly and provided through the government for their high security applications.
  • This invention would of course be capable of employing this DES security system protocol on all of it's two way transmissions between devices, e.g., PFN's TRAC system computer terminals and or gateways, their wireless and or any land line communications to PFNs.
  • both ends ofthe transmission must be equipped to electronically cipher and decipher through a encryption and de- encryption key program no mater which technology is used and in what form of hardware, hardware embedded software firmware, or solely software added to any existing hardware either in the processor or computer section of a PFN, it's modem circuitry, and or as part of any of any of it's communication devices circuits and or any remote monitoring control management and storage system responsive to any PFN/TRAC unit.
  • 301 is the two way communication device with the DES and the PGP systems on each side showing the options of encryption and the small arrow to the right of PGP points to the right block as a 2 stage memory on board the two way PFN, which are parts numbered 105-107 in Figure one.
  • Number 302 is a line list of possible accountable functions for full remote control and remote monitored robotics. At least one variation of this two way PFN will completely support all of these functions including any special sensors, identification systems environmental sensors, audio video systems, all machine controls and will monitor all machine sensors.
  • 301 memory storage are shown here as a plurality of local memory. One a current running loop of application specific determined length and content. And the other local memory a application specific incident based or event storage.
  • This second data storage is permanent and housed in a protected area with special authorization necessary to physically and or electronically to access the data.
  • the proprietary design also, provides either a redundant storage of this same incident in at least one remote location or a limited message flag (for the data limited two way pager systems) to be sent to an appropriate authorized monitoring E-mail address, or computer network or RF receiving node. While these memories are detailed in a plurality for local and remote locations this is merely done to provide these options for any standards effort that can be applied to the application specific protocols and areas.
  • 303 also can support the same two stage local memory storage. With this one way system, there is no wireless remote storage, without the physical removal ofthe data or through physical connections. There is no report back function in real time.
  • the one way system can also support the same processor capacity to do all the same functions as the more sophisticated two way PFN, but is limited in remote control by not having a real time monitoring in a remote location to guide tasks by video.
  • the 303 one way system must have it's data recovered physically through a secure download communication port. This interface communication port can, also, be in place on the two way PFNs if so desired.
  • remote control functions can be preprogrammed and or guided and or confirmed through other two way PFNs on location that can video the one way PFN systems host and or report on other telemetry data about the one way PFN that warrants specific remote commands. So by teaming one and two way PFNs one can provide a complete remote control system for the one way PFN. Total accountability is still provided in two levels in the one way PFN (rewritable and permanent). Also an extendible and retractable connector either hydraulic, air or electrically activated and controlled can connect the one way PFN to any ofthe communication ports on same equipped two way PFN to report back any pertinent data that needs near real time consideration.
  • 304 Illustrates all the same functions that are listed for the two way PFN and states that it has only a physical retrieval accountability for any data stored.
  • 305 is a block at the bottom ofthe page and its functions can be performed by both the one and two way PFNs.
  • 305 is any special sensors section that will be gathering application specific data for these any applications e.g., environment, radiation counters that transduce the number of Rads or particle strikes into an electronic signal for the processor software to evaluate through compare lists set up for an application specific PFN or as burned in firmware on simple device where a simple PFNs is set up as to sense an environment. If this PFN is at an installation or in a remote location it will be powered by solar cells to recharge it's batteries.
  • the TRAC system will be programmed special to handle specific functions for specialized sensing, e.g., like hydraulic weight sensors, many of these peripheral devices and sensors exist as C.O.T.S. products and their are flexible software products that can be easily adapted to support these applications.
  • Another 305 special sensor is the nose. Which is a sensor that can identify odors 2000 times more accurately than the human nose and is capable of discriminating substances and matter at a molecular and even atomic level.
  • This sensor already designed to deliver unique electronic signals for it's application specific software compare list library of known substances will serve well in high security applications to identify biological and chemical toxins explosives, e.g., potassium nitrates etc., and leaks in regular chemical containers in any commercial or governmental installations airports.
  • a mobile PFN/TRAC system when coupled to a mobile PFN/TRAC system preferably a two way PFN on a host machine full accountable robotics can be provided for most any hazardous environment and or contraband search task.
  • the PFNs could operate electrically controlled weapons in unmanned equipment that was damaged or unmanned either due to the loss of life or to prevent the loss of life by using the machinery and equipment through remote control and or full robotics (based on the level of PFN computers and onboard programming).
  • PFN armored machines and or equipment would be all terrain like tanks, track vehicles, hum versus wheeled vehicles, hover crafts, etc. And of course their peripherals could be all ofthe same and more in the military weapons categories.
  • Eventually special peace keeping PFN controlled equipment would be created to help maintain order in an unstable area (This is a system of MM Network to develop a Real ROBO Cop in plurality, through this technology's Spider eyes program) but first as part of every piece of equipment networked and remotely controlled.
  • the "car plane" designed by Moller has been developed for future three dimensional transportation for the individual. The technology exists to day to set up a guidance systems with the three coordinates delivered by the current GPS systems.
  • the left side column is the communication devices them selves. In reading down this column there is one way paging,one way radio frequency signal equipment, two way paging, two way wireless phones and land wired PFN's listed as PHONE, two way radio frequency signal, and cordless phones which are short range radio frequency signals received and put out on land based phone lines. And finally short range radio frequency signals.
  • PHONE two way radio frequency signal
  • cordless phones which are short range radio frequency signals received and put out on land based phone lines.
  • short range radio frequency signals are short range radio frequency signals received and put out on land based phone lines.
  • Each PFN will have at least one communication device interfaced with a processor system and memory storage
  • This chart can be referred to when reading and reviewing Figures 3, 4, 5, and 6 with all the different types of communications detailed. This chart will quickly provide the basic on board record and report back properties and data storage options that can be expected from any particular type of PFN by the communication devices they are employing.
  • FIG 4 This drawing is ofthe simplest one way communication PFN and these basic electronics have already been prototype used and proven from and for the other related applications. Basically with the one way communications there is data storage on board the host in the PFN at two separate locations, but they require physical retrieval ofthe data. This device in it's most basic form will not report back to any remote control and monitoring system, but can be sent messages, which will activate preprogrammed responses. This is the basic encryption of a one way PFN, but, as was earlier described in Figure 3 these units when used in concert with the other two way PFNs can transfer their data and thereby have the two way PFN report the data to a remote location.
  • the invention has it's own proprietary configurations that are detailed in many different modalities throughout all the related filings. And the invention's PFNs and TRAC remote control system is capable of interfacing with many other already existing components and systems to enhance any remote control product and for security and management.
  • This invention was and always has been expressly designed in this manner to provide a secure physical platform and electrical interface to focus, organize and help standardize remote control functions for all equipment in every application.
  • the TRAC software protocols are designed to continue this security and provide accountability to the system from the PFN to any network the system is interfaced with.
  • the invention's TRAC programs can be a stand alone products or set of interfaced devices which can be married to any existing system (modular) and add to both creating a better set of products and or better remote control, management and monitoring systems.
  • the mini computer box directly below, the C.OT.S. receiver processor (Create-a-Link or comparable device is for the traditional PFN computers either the Basic stamp computers I, II or the planned Euro-boards 188, 386 and 486 or even those with Pentium processors, that were described in the earlier patent 112756-202.
  • the choices of computer processors is once again application specific with the 386 or higher processor being necessary to support better quality video applications with reasonable speed, smoothness, and quality, for digital applications.
  • snap shot video applications can be achieved with smaller and less capable processors.
  • the on-board communication systems e.g., cellular or wireless phones, two way reflex paging and other RF transmission equipment either on board the host equipment and controlled through the PFN and the accountable software TRAC that must manage the authorization of a signal and authenticate any command functions, as well as, process all the sensed operational and driver action data and store it in the two local memories under the proper circumstances with the appropriate time date and command string record.
  • the on-board communication systems e.g., cellular or wireless phones, two way reflex paging and other RF transmission equipment either on board the host equipment and controlled through the PFN and the accountable software TRAC that must manage the authorization of a signal and authenticate any command functions, as well as, process all the sensed operational and driver action data and store it in the two local memories under the proper circumstances with the appropriate time date and command string record.
  • the little box GPS number 407 is the global positioning system or it can be any type of locating equipment either a separate hand held device interfaced with cables or as an integrated chip set circuit hardwired into the computer or processor, or as merely a chip set as has been described in 1 12756- 202.
  • the last two of which can also be in the form of cards with edge connectors that plug into the euro- board 100 mini computers detailed in the second patent 1 12756-202 as mentioned above and incorporated herein by reference.
  • the HPC box to the left ofthe mini computer box is the Host machines Programmable Computer or control circuit and or processor.
  • This can be the only computer in the secure interface or it can be interfaced with other control circuits or processors either proprietary and or other C.O.T.S. products which are coupled in the secure interface and made a more reliable, accountable monitoring and remote control device termed a PFN which stands for (protected) Primary Focal Node.
  • the PFN is designed specifically with versatility to provide a physical platform with a universal electrical set of interfaces and accountable TRAC software to develop a logical organization and manageability for remote control and robotics to meet societies legal needs for all these related technologies and their combined functions.
  • This focal point (PFN) on each piece of equipment housing and linking all electrical control circuits with host peripherals and sensors to off board monitoring and remote controls provide the organization, security and accountability through TRAC software and memory storage for society to meet insurance and security concerns for the use of aggressive remote control and robotics. And above all the PFN and TRAC gives organization and structure to write a standard to for remote control and robotics applications for all possibilities.
  • the PFN/TRAC system combines and focuses communication control circuits and data storage in one safe and secure accountable local location so that DOD, DOT highway safety agencies, FAA, FCC, FBI, CIA, law enforcement professional organizations, e.g., IEEE, and the many industry standards and watch dog groups can form a standards effort with the major auto manufactures and equipment and machine manufactures in every possible area.
  • the invention has been expressly designed to help create a responsible organized modality to this emerging area of merging technologies and help to marry it well to societies laws and needs.
  • the host equipment interface which would be merely a multi-pin interface connector from the box if the HPC is contained with in the PFN.
  • the lower blocks below 404 is the sensory or telemetry data gathered on the machine and or operator, and the box to the right represents the functional control of devices or accessories on the host equipment. With these two functions combined the equipment operation can be achieve through remote control and monitoring all as part of an entire network.
  • the center of the page and specifically the lower center their is three boxes displaying the two levels of on board memory storage with three accompanying numbers 105, 106, 107. These numbers are used to delineate the different types of memory storage devices and not the actual number of devices employed in any specific PFN system.
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is C.O.T.S. based, PC, Programmable Controller (Stamp); or if it is custom, logic sequencer, micro processor, FPGA (field Programmer Gate Array) or a custom gate array. Even though these are not all displayed in the three Figures in this application all of these hardware options will probably run some for of TRAC software in some application and therefore should be included as hardware implementations for this technologies PFN/TRAC
  • TRAC Interfaces/Software will have algorithms for BANK/Stock Exchange Transaction Products. Many of these will be supported C.O.T.S. products and through the primary TRAC software. There will be other accountable programs for remotely piloted vehicles RPV and this technologies proprietary PASSS software for the automated slow stop and securing of a vehicle in a stationary position. And this technologies PAGSSS software which has numerous variations but basically it is the proprietary automated guidance slowing stopping and securing of a vehicle through remote control as an evolution of PASSS. Other software specifications include the use of a Commercial: 128/64 bit Encryption for web transactions. And for high security in government and military applications: DES the (Data Encrypted Standard).
  • the interfaces and connectors are named extensively in the related patents however, presently the Automobile industry is planning to start a standardization effort for electrical connect-ability of accessories.
  • This technology has been focused on this point or issue in the last two related patent applications and looks forward to participating in any effort to develop H-Rel universal electrical connectors, and can offer actuators, sensor protocols, signal levels in the aggressive automated and remote control devices to reach deeper into a standards effort in this area.
  • This technology will be constructing prototypes with these interfaces anyway and a collaborative effort is always welcome when ever possible.
  • Telephony is another industry interface with digital cellular, PCs, 56K modem, pager technology as well as the varied RF signal and light transmission equipment.
  • Figure 5 This an illustration ofthe simplest two way communication systems and the necessary security devices to condition the signal encryptically for security protocols. It is basically another flow chart showing the data from the remote control and monitoring network, as well as, all the data and control signals to the data storage and the peripherals through the many possible processor options running a form of TRAC software. This is the same as Figure 4, however, it is in two directions with the remote control and monitoring system and there by creates three accountable levels of data storage on and off the host piece of equipment. Two levels on the equipment and at least one partial storage remotely copied of any pertinent data. Or an application specific Email or warning flag detailing the PFN/TRAC systems ESN electronic serial number to obtain physically a more extensive memory record of an event or incident.
  • This drawing is ofthe simplest two way communication PFN and these basic electronics are planned prototypes from and for the other related applications. Now with these basic two way communication capabilities there is data storage on board the host machine in the PFN at two separate locations that still can be physically retrieved; but, also the capability to report this data to at least one remote location (is limited).
  • This device in it's most basic form will report back 20 characters to a remote control and monitoring system, through a reflex paging service in the U.S., South Central America, middle east, and Asia. It will also be possible in the future to accomplish this in Europe with the ERMES version of two way paging protocols in the near future. And these messages can be sent to E-mail addresses for inexpensive world monitoring management and control.
  • any ofthe two way pagers can be sent messages, which will activate preprogrammed responses as is the case with one way paging.
  • PFN two way paging protocol
  • preprogramming in the PFN computer can send a series of 20 character messages to a remote location, where the monitoring software can reconstruct the whole message.
  • multi-paging devices that can be combined to send a large data message with different carrier frequencies for each paging device. This would increase the difficulty in intercepting the entire signal or message being reported. (Motorola's reflex two way paging protocols are being referenced here for all of these options basically, the ERMES products are still under development.)
  • PFNs can also accomplish data transfer though regular land line comport connections where ever available provided the PFN is already out fitted with DES chips or PGP software for it's wireless transmission capabilities. (If not it will have to send it's data through a local DET comport which will probably be hard wired to the local monitor and remote control station or network gateway). All one and two way PFNs will be capable of generating dial up phone tones to connect to a phone node if so desired. And of course if land line connections are available for HS and MS security they will have the necessary sending and receiving equipment and software to handle the encrypted signal. Of course the same would be true for secure commercial applications as well with PGP protocols. This could all take place in an automated setting as well.
  • PFN containment is a series of boxes, which are all components ofthe PFN and housed within the containment. These components are all individual C.O.T.S. products that can be interfaced as separate devices or IC- C.O.T.S. components integrated and connected and or hard wired together to form combinations of devices and IC components.
  • the invention has it's own proprietary components and configurations that are detailed as many different modalities throughout all the related filings. And the invention's PFNs and remote control system is capable of interfacing with many other already existing components and systems to enhance any remote control product and or security system in many ways.
  • the invention was and always has been expressly designed in this manner to provide a secure physical platform and electrical interface to focus, organize and help standardize these functions for all remote controlled equipment for every application.
  • the invention can be a stand alone device and or system of any size (or a set of interfaced devices systems and networks) or it can be married to any existing system and add to both by creating a better set of products capabilities and remote controls in any monitoring system as well as provide accountability through the TRAC software.
  • To the right 500 is the standard two way reflex pager as one ofthe possible two way receivers.
  • 501 another two way optional transceiver, which could be any type of radio transceiver on any frequency and most all the frequencies are listed on Figures 9 and 10. However, the allocated and dedicated frequencies are designated and many of them are shown on the allocation chart.
  • 502 is a combination of communication and processor functions integrated and combined into one system and is a specific C.O.T.S. product made by Motorola Corporation, called "Create- a-Link II". This all in one product serves as a prime example ofthe inventions versatile application in combining other technologies as part ofthe protected interface and accountable data storage components, when ever possible, rather than solely relying on the proprietary pager technology and parallax mini computer and other proprietary computers if so desired.
  • This Motorola product "Create-a-Link II" is different in that it employs the reflex two way paging protocols which are a necessity to achieve the report back function for this minimal two way variation.
  • the C.OT.S. Receiver processor (Create-a-Link or comparable device) is for the traditional PFN computers. Either the Basic stamp computers I II or the euro boards 188, 386 and 486 or even those with
  • Pentium processors that were described in the earlier patent 112756-202.
  • the choices of computer processors is once again application specific with the 386 or higher processor being necessary to support full video applications with reasonable speed, smoothness, and quality, however. Snap shot video applications can be achieved with a smaller and less capable processors in the mini computer with the sacrifice in any real time full video being jerkiness and or the time space needed to process any digital image. This condition requires extra sensors to effectively and remotely control a machine so equipped in near or very near real time. And other criterion in video quality especially for the report back function is the level and capability ofthe on board communication systems, e.g., cellular or wireless phones, this 2 way reflex paging and other RF transmission equipment either on board the host equipment and controlled through the PFN.
  • the little GPS box number 507 is the global positioning system or it can be any type of locating equipment Lorands, etc., either a separate hand held device interface with cables or as a integrated circuit hardwired into the computer or processor, or merely a chip set as has been described in 1 12756-202.
  • the last two of which can also be in the form of cards with edge connectors that plug into the euro- board 100 mini computers detailed in the second patent 1 12756-202 as mentioned above and incorporated herein by reference.
  • the HPC box to the left ofthe mini computer box is the Host machines Programmable Computer or control circuit and or processor.
  • This can be the only computer in the secure interface or it can be interfaced with other control circuits or processors either proprietary and or other C.O.T.S. products which are coupled in the secure interface and made a more reliable, accountable monitoring and remote control device termed a PFN which stands for (protected) Primary Focal Node.
  • the PFN is designed specifically with versatility to provide a physical platform with a universal electrical set of interfaces to develop logical organization and manageability for remote control and robotics to meet societies legal needs for all these related technologies and their combined functions.
  • This focal point (PFN) on each piece of equipment housing and linking all electrical control circuits with host peripherals and sensors to off board monitoring and remote controls provide the organization, security and accountability to justify to society and meet insurance and security concerns for the use of aggressive remote control and robotics. And above all the PFN gives structure to write a Standard (for remote control and robotics applications by focusing communication control circuits and accountable data storage into one safe and secure location. DOD, DOT highway safety agencies, FAA, FCC, FBI, CIA, law enforcement professional organizations, e.g., IEEE, and the many industry standards and watch dog groups.
  • the invention has been expressly designed to help create a responsible organized modality to this emerging area of merging technologies and help to marry it well to societies laws and security needs.
  • the host equipment interface which would be merely an interface connector from the box if the HPC is contained with in the PFN.
  • the lower blocks below 504 is the sensory or telemetry data gathered on the machine and or • operator, and the box to the right represents the functional control of devices or accessories on the host equipment. With these two functions combined the Equipment operation can be achieve through remote control and monitoring all as part of an entire network.
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is C.O.T.S. based, PC, Programmable Controller (Stamp); or if it is custom, logic sequencer, micro processor, FPGA (field Programmer Gate Array) or a custom gate array. Even though these are not all displayed in the three Figures in this application all of these hardware options will probably run some for of TRAC software in some application and therefore should be included as hardware implementations for this technologies PFN/TRAC. These TRAC Interfaces/Software will have algorithms for BANK/Stock Exchange Transaction Products. Many of these will be supported C.O.T.S. products and through the primary TRAC software.
  • Identification systems can be employed to recognize friendlies when they arrive and can take orders directly form them on location if need be. This can be accomplished through any and all forms ofthe short range communication systems already described that can even differentiate friendlies from aggressors during a security incident or emergency with the technology already described throughout all the related patents, e.g., IrDA, limited transmission RF devices other light transmissions and the phone system or any other RF transmitter (which will be personally coded device communicators limiting access by finger print or one ofthe many other Id systems previously detailed).
  • IrDA limited transmission RF devices other light transmissions and the phone system or any other RF transmitter
  • the third formal 1 12756-301 all the electronic devices that are to be controlled on any piece of equipment machine and vehicles, will have a section that specifically describes these security devices for aggressive protection and retaliation options.
  • TRAC Trojan Horse defense System
  • the Protected PFN data storage would support any reported record to justify any such decisions and their should be well established procedural protocols for these security scenarios for, e.g., embassies, military installations, nuclear facilities, and any special security risks etc.
  • the infrared comports that have been extensively detailed in the other related applications and or any ofthe light transmissions and or RF signal transceivers will once again reduce the hardware needed to complete the interface and any data transfer.
  • the transmission be physical or wireless of any type; the modality will have to be assessed for it's vulnerability to access any signal and or transmission and the appropriate DES-PGP and or any other security protocols will have to be in place at either end of any data transfer if deemed warranted
  • TRAC for the very high security protocols commercially and militarily. This focus on the high security protocols was done to show peripheral accessories however the same PFN/TRAC system will be used in everyday applications with out DES and other high security protocols.
  • TRAC's FACT program that might carry some high level security control encrypted Commands to allow the proper authorities to control any equipment in a state of emergency. This of course will be determined by the public and it's governing bodies and agencies.
  • the PFN/TRAC system is designed for all accountable aggressive remote control scenarios and the control security is just one of many.
  • PFN containment is a series of boxes which are all components ofthe PFN. These components are all individual C.O.T.S. products that can be interfaced as separate devices or IC C.O.T.S. components integrated and connected or hard wired together or as combinations of devices and IC components.
  • the invention has it's own proprietary configurations that are detailed in many different modalities throughout all the related filings. And the invention's PFNs and remote control system is capable of interfacing with many other already existing components and systems to enhance any remote control product and or security system in many ways. This invention was and always has been expressly designed in this manner to provide a secure physical platform and electrical interface to focus, organize and help standardize these functions for all equipment in every application.
  • the invention can be a stand alone system or a set of interfaced devices or it can be married to any existing system and add to both to create a better set of products and remote control or management and monitoring system.
  • 600 is the standard cellular phones (Digital (D wave) and analogue) as the two way transceivers and this circuitry is detailed in the second patent detailing all the modems and cable connections for all the possible C.O.T.S. hand held devices. And also all the PCMCIA cards were described as well as cellular phone IC cards that can be connected to the all the computers listed in the same second patent 1 12756-200.
  • 601 another two way transceiver option could be any type of radio frequency unit on any frequency and all the frequencies are listed on Figures 9 and 10.
  • 602 can be a combination of communication and processor functions integrated consolidated and combined into one system and or a specific C.O.T.S. like the simplified switching device Create-a-link but more sophisticated and capable.
  • DES and PGP signal security
  • PCMCIA Card is a product that combines the Cellular phone technology and modem into one device with antenna for lap top computers to function in a wireless environment for phone data connections.
  • This particular C.O.T.S. product has been singled out as one system that will be utilized in the security PFN prototypes and is mentioned here and will be totally detailed in the formal application.
  • the modem section will have to be modified to accommodate the DES chip set, or this function of encryption will be accomplished in the mini computer which must be able to accommodate the chips and or in the case of PGP encryption run any ofthe necessary software.
  • TRAC in many cases will provide it's proprietary encrypted software algorithms however, the PFN/TRAC system will be structured to support must all C.O.T.S. software.
  • the mini computer box directly below, the C.OT.S. transceiver processor option is for the traditional PFN computers either the Basic stamp computers I II or the euro boards 188, 386 and 486 or even those with Pentium processors, that were described in the earlier patent applicaion (1 10273-202).
  • the choices of computer processors is once again application specific with the 386 or higher processor being necessary to support full digital video applications with reasonable speed, smoothness, and quality.
  • the other criterion that will give good video quality and properties for the report back function is the on board communication systems, e.g., cellular or wireless phones and any other capable RF transmission equipment on board the host equipment and controlled through the PFN.
  • This system is the shepherd or watch dog to better provide visuals for any ofthe less capable PFN units that have limited or restricted report back or video quality due to data size, band width, and transmission time capability especially in transmissions from the two way paging system Create-a-Link II ( a Motorola Reflex protocol) or as is the case with the one way (pager) receiver as it is configured in Figure 4 which has a total lack of any wireless report back functions in and of itself.
  • the little box GPS number 607 is the global positioning system or it can be any type of locating equipment either a separate hand held device interface with cables or as a integrated circuit hardwired into the computer or processor, or merely a chip set as has been described in 1 12756-202.
  • the last two of which can also be in the form of cards with edge connectors that plug into the euro-board 100 mini computers detailed in the second patent 112756-202 as mentioned above and incorporated herein by reference.
  • any and all PFNs can be outfitted with GPS and of course the most sophisticated can provide hot accurate readings and give positions with the military GPS with in centimeters with their additional ground signal that counter the distortion that the ionosphere creates in the commercial versions ofthe GPS which are within 30 meters as to an accurate location.
  • the HPC box to the left ofthe mini computer box is the Host machines Programmable Computer or control circuit and or processor. This can be the only computer in the secure interface or it can be interfaced with other control circuits or processors either proprietary and or other C.O.T.S. products which are coupled in the secure interface(s) and made a more reliable, accountable monitoring and remote control device termed a PFN which stands for (protected) Primary Focal Node.
  • the PFN/TRAC system is designed specifically with versatility and universality, to provide a physical platform, with a universal set of electrical connections and interfaces which are ideally standardized as much as possible.
  • TRAC authorization and authentication software controlling the local and remote event memory storage functions; to develop a logical organization and manageability for remote control and robotics to meet societies legal requirements and social needs for all the related technologies and their combined functions.
  • This focal point (PFN) and TRAC software on each piece of equipment housing and linking all electrical control circuits with the host peripherals and sensors to off board monitoring and remote controls provide the organization, security and accountability through the TRAC system, to justify to society and meet insurance and security concerns for the use of aggressive remote control and robotics in any scenario.
  • PFN/TRAC system gives structure to write Standards to: (laws, rules regulations and code) for materials and protocols to perform remote control and robotics by focusing communication, control circuits, data storage and accountable TRAC software in one safe, secure location for the most part.
  • DOD national security agencies and public governing committees, political bodies and agencies, like; CIA, Secret Service, DOT, highway safety agencies, FAA, FCC, WWW management agencies and organizations, The Justice Department, FBI, law enforcement professional organizations, e.g., IEEE, automotive manufactures and other manufactures, insurance industry, and the many industry standards and watch dog groups, as well as the general public input, should make up the groups that will deliberate and form the laws to be legislated, with the appropriate rules, regulations and protocols needed to plug in much ofthe appropriate, safe, individually and socially appropriate and legal software commands for TRAC system, as well as, uses for this new technology.
  • the (MMN and WWW) machine messaging network interfaced often with the world wide web and or the Internet from and through the PFN/TRAC gateways created on more and more equipment.
  • the invention has been expressly designed to help create a responsible organized modality to this emerging area of merging technologies and help to marry it well to societies laws and needs.
  • the lower blocks below 604 is the sensory or telemetry data gathered on the machine and or operator, and the box to the right represents the functional control devices, or the activity control of devices and or accessories on the host equipment, which will be standard automated controls for the machine and operator for the most part unless there is an application specific need.
  • TRAC the programmable and modular software and varies in structure and format based on the different hardware implementations weather it is C.O.T.S. based, PC, Programmable Controller (Stamp); or if it is custom, logic sequencer, micro processor, FPGA (field Programmer Gate Array) or a custom gate array. Even though these are not all displayed in the three Figures in this application all of these hardware options will probably run some for of TRAC software in some application and therefore should be included as hardware implementations for this technologies PFN/TRAC.
  • TRAC Interfaces/Software will have algorithms for BANK Stock Exchange Transaction Products. Many of these will be supported C.O.T.S. products and through the primary TRAC software. There will be other accountable programs for remotely piloted vehicles RPV and this technologies proprietary PASSS software for the automated slow stop and securing of a vehicle in a stationary position. And this technologies PAGSSS software which has numerous variations but basically it is the proprietary automated guidance slowing stopping and securing of a vehicle through remote control as an evolution of PASSS. Other software specifications include the use of a Commercial: 128/64 bit Encryption for web transactions. And for high security in government and military applications: DES the (Data Encrypted Standard)
  • the interfaces and connectors are named extensively in the related patents however, presently the automobile industry is planning to start a standardization effort for electrical connect-ability of accessories.
  • This technology has been focused on this point or issue in the last two related patent applications and looks forward to participating in any effort to develop H-Rel universal electrical connectors, and can offer actuators, sensor protocols, signal levels in the aggressive automated and remote control devices to reach deeper into a standards effort in this area.
  • This technology will be constructing prototypes with these interfaces anyway and a collaborative effort is always welcome when ever possible.
  • Telephony is another industry interface with Digital Cellular, PCs, 56K modem, pager technology as well as the varied RF signal and light transmission equipment.
  • PFN/TRAC systems will provide for an organized development of this technology so that it marries well to a democratic and free society that has embarked on the technical road to mass data gathering management and memory storage, while it respects the individuals rights to privacy by providing accountable protocols for access to personal data. Because PFN/TRAC can provide objective records for all, disputes will become much more clear and easier to resolve. Of course the use and the laws governing any abuse will be determined by the people and their duly elected governing bodies and appropriate government agencies police systems civilly and armed forces globally. Policy would determine by the appropriate levels of governing organization so that any strategic and or defense use deployment and protocols for the PFN/TRAC system with C.O.T.S. products around the world to manage control and or witness altercations and disputes has the correct review and accountability.
  • This Figure is devoted to showing the future merging of communication technologies with micro processors and greater memory storage and conversely greater product capabilities and efficiency both in size and function. It has been created deliberately to detail out a good clear commercial evolution of consolidation of technology in the (PFN) so anyone skilled in the arts can easily structure the most cost effective combination of C.O.T.S. products or components to create the best PFN for the present time and into the future. It also has been done to clearly show that all these developments were planned and detailed within the related patent applications to keep the invention current in the future.
  • 6A1 is any and or all telephony technology from land lines to cellular, wireless and or satellite.
  • 6A2 is any and all radio frequency equipment both receiver, transmitters, and or any combination transceivers that are interfaced in and through the PFN.
  • 6A1 an 6A will be combined and interfaced as is the case with some phone radio system, e.g., like NEXTEL products and Motorola has other radio and telephony combinations including pager activities. So it is obvious that these will combine into one personalized communication center and that this multi device will be a functional interfaced component in this invention.
  • the super modem also supports the unibus internal link in the same manner. This is not per se a new Modem or modem design standard. But the integration in the PFN first level converting circuits to be incorporated and handle application programs from the host machines application specific activity controls and sensors. It will allow for standard connectibles with special adapters and also provide for a control signal which is a modulated digital signal sent out on the power lead to individual activity controls, sensors, operator telemetry and to handle audio and video digital signals..
  • the super modem 6A(UTU) is a universal transposing unit and will be able to handle analog to digital conversion, digital to analog conversion, all encoding, decoding and encryption processors either in it's firmware or in it's installed software running in the mini-computer section.
  • This modem section can in the future be integrated directly into the communication devices and or combined with the mini-computer section or they might well all be integrated together in hardware and accompanied with the FACT main processor software (that is system or component failure sensitive with memory storage to confirm functional reliability and emergency power supply and charger circuit as one single protected and sealed protected PFN integrated circuit. If so this is still within the nature and scope ofthe invention and it's purpose.
  • fiber optics as was detailed in an earlier PCT patent application and may be used to carry control and monitoring signals. In this case the appropriate sensor and converter would be part ofthe super modem interface and any responsive peripheral circuitry.
  • Multi-Bus Comm Link there will be a universal antenna buss properly shielded grounded and or filtered to provide lower or no noise. Or this universal antenna will be run separately.
  • 6A PFN Core will incorporate 6A1 through 6A4 with memory storage 105 through 106 in one self contained protected containment and integrated circuit with a unibus internal interface connector link for any and all past present and future accessories desired. 6A4 and 6A5 illustrate this present interface capability. It should be well understood through this Figure that any consolidation and or combination of communication technology, computing, or controlling processors and memory storage that is used to monitor manage and control man and machine interaction and individual activities from a protected environment and provides accountability falls with in the nature and scope of this invention.
  • the wall structure is discussed at this time as it will be constructed for specific applications.
  • the wall will be constructed as a laminated or composite structure for the most cost effective manufacturing, however, in the very specific security applications these wall components might well require specific customization and because of their limited markets increase the cost of a PFN.
  • universal structures will be standardized in application specific areas to keep cost at a minimum.
  • 700 is the thermal insulating center lamination between two walls, the outer 701 and the inner 702.
  • This center as already detailed in earlier filings and can or will be composed of either fiber glass products, gypsum, silica, mica, asbestos, or asbestos replacement products, Teflon and or high temperature plastics, e.g., polysulphone, all of which would either be adhered to 701 and 702 or merely sandwiched between the two walls.
  • one product has been chosen for the experimental prototypes, and it is called “solid smoke” and is a product developed by NASA for the space tile replacement and is completely detailed in earlier application 112756-202.
  • this center area 700 being a somewhat flexible fill insulation area between generally two solid structures a wire screen mesh, net, grid, or grill of metal properly spaced and constructed from metal products possibly copper, lead, etc., will be placed to block EMF/EMW and or various forms of radiation in special applications.
  • the mesh can be pressed or impregnated into this insulating composite section in the center of these two walls to add greater protection for the electronic products housed inside the PFN.
  • This center can and will be designed to provide a soft seal when mated with another section of a PFN wall that will be resistant to the normal elements and harsh chemicals when end sections of 701 are butted up to other 701 end edge sections, e.g., corners (the same for 702) to provide another surface to seal upon, e.g., welding, resins, glues.
  • Manufacturing can also reduce cost by making three concentric boxes or containers of any application specific PFN shape.
  • a non flammable glue adhesive or solvent for the insulation section would be applied to the center section and the larger 701 box would have it's inner surface chemically etched or conditioned to receive the pliable adhesive.
  • the outer surface of box 702 on the smallest box would have its surface prepared in the same way to receive the adhesive (if the surfaces are metal products).
  • the protected cable access hole will be positioned to allow the trapped air to escape upon assembly of all three box sections. This leaves only one side to be installed with mating beveled edges which are both glued and sealed, e.g., welded.
  • This last side or plate will contain the access panel with locking mechanism and hardware (physically and or electrically controlled in most cases). And special consideration is given to any antenna and locking mechanism that is part of this protected containment with hard wiring routed with in the structure (these considerations are application specific with a lot of details in earlier filings). 701 points directly to the outer wall and this wall will be made of hardened metal products (described within) that resists physical penetration as a primary consideration.
  • 702 is the inner wall which can and will be constructed of various different materials as already named in the last outer wall description if so determined necessary by application specific criterion for any specific PFN application. It may as well be constructed of hardened steel thermally tempered to increase carbon content in the molecular bonds or a metal alloy composite product may be utilized with, titanium, tungsten depleted uranium etc. (this is the same for all hardened metal applications for the outer wall as well).
  • the inner wall could also be completely constructed of solid lead to create a final protective inner seal against radiation. Or a composite plastic already listed for the 700 and 701 parts with a EMF/EMW wave and radiation screen as already described for 700 and or 701 parts.
  • the thickness ofthe entire wall shows the thickness ofthe entire wall, which is once again application specific and will vary as a general rule, but also as a general rule the different PFNS will be designed to be as universal as possible in shape, size and structural composition.
  • the individual walls 701 and 702 may vary in thickness as well as the necessary thickness of insulation. All of these considerations will be application specific. For example in the automobile industry and normal civilian use the protective structuring can be scaled back to a standard that does not require the kind of protections detailed for high security to meet an acceptable standard. This will be true for all applications. They will individually have to be structured to meet the requirements ofthe application.
  • the PFN will also be structured to be actually part ofthe host equipment physical structure in some security scenarios and in this case the system would have to be secluded and require limited and or controlled access if it were to have the appropriate military value. It would be structured to assert final control over a piece of equipment but it's influence would be undetectable and or camouflaged to a large extent and above all extremely difficult to access or terminate. (These systems are reserved for special disclosure and development.)
  • the PFN will be used to house and protect the host programmable controller (HPC) in the drawings 4-5-6 next to the mini computer contained in the PFN.
  • HPC host programmable controller
  • These functions will ultimately in many cases be integrated with the obvious advantage being consolidation ofthe vital functional controls ofthe equipment integrated with partial or the whole data storage, remote control technology with the necessary security components all in one secure spot in a plug and play modular or card form and operated by TRAC software. Which can be physically displaced for an immediate disablement and total securement of a piece of equipment if so desired. But only by authorized and authenticated entry if this is a feature or capability so desired. And Of course any portion of these electrical components can be given this same plug and play capability if so desired.
  • the billing box was designed to be an add on unit or after market device to collect a fee for use of a vehicle, e.g., rental cars, Taxi Cabs, buses, etc.
  • Part 301 is either a standard credit card, ID card or any other information card that one wishes to use to enter information to the billing box (PFN).
  • PPN billing box
  • TRAC can run the bank card/Stock Exchange Transaction products and algorithms via the commercial 128/64 bit Encryption or web transaction. And or utilize the C.O.T.S. banking products and protocols, These will be named and given more detail in the formal application. These transactions will be provided memory storage for personal accounting and verification to the financial institutions as proof of payment. PFNs will be every where and all those with ID systems PIN number and key pads, finger prints and other forms of personal identifications will allow for the personal payment virtually anywhere.
  • Part 802 is the regular or standard cell phone handset that if it is in use the lower bill box could be configured with out a key pad.
  • Part 803 is a standard key pad format that can be used to communicate with the bill box when connected and interfaced with any the invention's computer and supported with the proper interfaces and software and or firm ware.
  • Part 804 is a multibus bar connector universal with 29 contacts so that it can support any system/device entered into the bill box. These were earlier designs. And this earlier design will probably not be used and will be replace by the multi bus system IEEE 1394 or the universal bus and or IrDA interface.
  • Part 805 is a quick connect end on one portion that will make a pigtail to connect with any combination of electrical connectors on the other end of this second portion, e.g., computers, any electronic connections, radio or automobile, but in this case is depicted in the drawing as RS232 part number 806.
  • the other short pigtail is part number 805, there may be 5 to 10 in quantity, that can slide easily back and forth to allow many varied positions for the different devices and the space they require. All hardwired connections could be made with Commercial Off the Shelf devices in the box or by infrared com port connections.
  • a segmented infrared bar can be aligned to any device's infrared window to communicate with the invention's control circuits.
  • Part 807 is a mouse ball that one can use to run window type graphic programs either displayed in the unit display 808 and/or any larger display within the field of view for the driver, either LCD vacuum tubes, e.g., VGA flat screen, or the new hologram wind screen in the newer cars (e.g., Pontiac Grand Prix).
  • Part 808 is the unit display
  • part 809 is an emergency power pack
  • part 810 is the secure bill box.
  • 901 is a manual lock for the PFN and these can be at any quality desired. It also has an electrical connection to be use in arming the device.
  • 902 is the memory storage in this case audio recordings and a flash memory of operational data (Sony's memory stick 8 meg a bites a piece).
  • 903 is using a stamp processor as the controller.
  • 905 is employing OCR systems however Motorola has many C.O.T.S. products that can hook up with direct connections and all are covered in the related patents. In fact this entire system has been well detailed in all the related patent applications.
  • Figure 10 is a manual lock for the PFN and these can be at any quality desired. It also has an electrical connection to be use in arming the device.
  • 902 is the memory storage in this case audio recordings and a flash memory of operational data (Sony's memory stick 8 meg a bites a piece).
  • 903 is using a stamp processor as the controller.
  • 905 is employing OCR systems however Motorola has many C.O.
  • FIG. 1 Shows a picture of a dash board in a traditional sedan.
  • the PFN just right ofthe dash is the PFN and it is depicted as a box with a personal computer slid all the way out ofthe containment with the lid or screen display opened so that the driver could use the computer screen with a GPS system like DeLorme running to receive automated directions to an address he was unfamiliar with.
  • Below the computer and the secure lock up center section rests a cellular phone that has its phone modem connector coupled to the heal ofthe phone and directly to the right is a second communication device a pager that is also coupled to an optical scanner in this case as was described in the first patent.
  • the lock up 1004 in the center can house permanent invention computers and storage records plus GPS and any communication devices that are desired on the vehicle all the time, This lock up section is only accessible by authorized personnel in the most ideal situation and hopefully mandated by law. This section would house the PFN invention computers and in the place of an on board personal computer their would be an LCD screen that could display map graphics if need be, through the on board computer systems.
  • the square boarder with circles inside is the walls ofthe PFN case.
  • 1001 is the outer metal case plate which can be up to 3/16" thick made out of AR metal plate to resist penetration or drilling.
  • 1002 is the inner metal plate up to a 1/8" thick and it is made of the same AR plate.
  • 1003 is an insulating product and their is two that are being used to construct the prototypes. One is "solid smoke” a product developed for the space shuttle and "Geo-bond" a gypsum product. None of these products or specifications should be considered the only way to create a secure PFN containment to fulfill any part ofthe nature and scope of this invention. The thickness of 1003 the insulating section would not exceed 3/8".
  • 1004 represents one kind of lock cylinder like those used in safety deposit boxes, however, not made of a soft metal like brass. From 1004 can be seen two flat bars that go out past the inner plate 1002 where they pass through a solenoid catch mechanism that when it is de-energized will not allow the bars to pass out ofthe front edge ofthe encasement. 1004 in the center can also be opened manually with a key. Once again there are many manual and or electrically automated locking devices that could be utilized for this same purpose.
  • 1004 is displaying the bottom compartments access panel swung open on a piano hinge part number 1006. So the view is displaying the back ofthe panel so bars can be seen and that is why they are depicted as solid lines. Behind 1004 lies the secured section which is represented with dotted circles because they are located in back of the bottom access panel in the open position. If the center section is the designated section to handle or store the legal storage electrical components it will not have an electric lock release or it will be disconnected to only allow for the proper authorities to remove this data or component parts. 1005 is the bottom access door in the closed position and that is why the bars are depicted in dotted lines.
  • 1006 is a piano hinge and is a part on each ofthe three sections as a point of articulation for the panel door.
  • 1007 is the standard glove box that can either be used or discontinued to allow for other rerouted accessories HVAC vent, ducting and planums or blowers motors, etc.
  • 1008 is the SIR compartment which is the sudden impact restraint or the Air bag. With on board distance sensing for front and rear as well as even side surveillance ofthe environment any impending impact would be sensed and automatically with draw any opened draws in use into the containment which would allow the aesthetic skin panel/drink holding table to spring return to a closed position. If the drinks were in the table with the table in the down position all 3 access panel doors would be closed and secured. This would be accomplished by electric servo motors or vacuum motors or cylinders or diaphragm systems for speed.
  • the electric cylinders could be used, e.g., "Memory metal cylinders.” At no time would the center section or a part ofthe center section be open to the cabin during operation as this is the protected black box storage area.
  • these configurations are flexible and the designs can very greatly, but when a permanent area is chosen it has to remain inaccessible till the proper authorized personnel supervise any reconfiguration, e.g., certified service personnel that have to enter their service identity credentials. Otherwise a customers insurance company must do the same or support clerical personnel for the police or department of motor vehicles.
  • 1010 is the pager as earlier described with a scanner on the front however any interface and connector system could be employed in the PFN. Also Motorola pager processor "Create-a-Link could be utilized here and even as an effective processor in the center section that is closed for the ultimate secure service functions as another C.O.T.S. computer communication combination for the inventions control center.
  • 101 1 is the standard cell phone with 409 depicting a connector modem, which will be wired through the trays to any on board computer to receive and transmit data to any system in the PFN or connected to it.
  • 1012 is a specialized tray connector made by or for the personal laptop computer that will provide all or any of the desired physical connections to interface the computer to the host vehicle or any other peripherals or to net work it with any other computers.
  • the holding and securing tray will then couple to the sliding either motorized or powered by vacuum. And so the electrical connections to be functional here it will have a controlled flex cable to 1 103 the central buss channel or canaleta or race way where it will route wiring up and down inside the containment.
  • Figure 11 shows two views ofthe secure box for the PFN in the Dash.
  • the top view is ofthe back ofthe box cut off so the components can be viewed.
  • the top shelf is showing a laptop with all its varied connections that have a performed shelf designed to supply the necessary connections directly to the laptop connectors.
  • This same tube works as an antenna galley and channel to house the control buss of wires to the out side ofthe secured and protected PFN. These wires are protected in a armored flex cable like the one described in the first patent for the protected beeper.
  • the bottom box illustrated in Figure 11 is showing the lock access panel doors with a piano hinge 1 106 for this sturdy structure.
  • This 1/8" thick access door is made out of stainless steel and numbered 1 1 10 in Figure 1 1.
  • the access doors 1110 can be opened in three different ways, one with a key in two places as displayed in Figure 11, another as described in Figure 10 with the throw bars out to the electric solenoid catch mechanisms and there by finally opened by electric solenoid release triggered from the inside program software ofthe inventions on board controllers which is reliably energized by the emergency batteries inside the PFN.
  • the two key system would also have the same solenoid lock release system.
  • dash plate/drink holding table numbered 1 107 which is illustrated in the down and open position and appears as the end view of this dash plate/drink table.
  • the front is molded and formed to create a uniform appearance to the dash board.
  • This aesthetic dash front may be constructed by covering the compartment panels with cushioning and upholstery and not having the drink top dash panel.
  • 1101 represents a molded rubber gasket that is grooved to accept the dash plate/drink table in the closed position.
  • 1 102 is the two sided lock placement cylinders if this type of lock system is employed. And 1 1 1 1 depicts the electric latch plate and solenoid assembly that receives the lock bolts from the keyed cylinders.
  • 1105 is another piano swing hinge for the table/dash cover plate.
  • 1104 is a coiled spring that returns the dash plate when all the drawers and/or trays are retracted.
  • 1106 is a shelf roller that can be slid into any number of slots in many places of 1002 the inner wall ofthe box.
  • These slots will either accept a tee ended fastener that supports these shelf casters or rollers or it will allow a compartment plate or separating partition wall to be slid down the slot.
  • These compartment shelves or rollers can be moved or exchanged to create any number of configurations, however, the trays will be standardized to certain sizes that will be customized by the manufactures to accommodate their products.
  • These separating plates have lock blocks that have drillings with 10/32" screws that will thread into tapped receiving holes in 1002 the inner wall. 1 108 in one of these partitions. 1106 the rollers have a screw that can be tightened to clamp the tee device against the inner wall skin- part 1002.
  • 1012 is the personal lap top in the top shelf. 1109 is the trays that ride on the rollers, these trays presently are designed to either be half the size ofthe PFN or to go all the way across the containment. This is not the only design for the movable trays and adjustable flat compartments and should not be considered so, but this design is being prototyped presently. Any protected containment or interface that is structured to coordinate and control remote functions on a machine all fall within the nature and scope ofthe invention.
  • the top draw houses the laptop computer 1012
  • the bottom draw houses the power pack batteries 1201 and 1202, the transformer 1213 and the inverter 1203 along with power supplies that are varied power taps 1217 for the C.O.T.S. products housed in the PFN.
  • the center drawer houses all the essentials to complete the necessary function for the PFN. It has a GPS 1216, A Cell Phone 1205 a Pager 1209 and a small PFN computer or controller 1211 and a data storage MO or rewritable CD's disk drive or hard drives or memory sticks 1212. With the drawers and compartments 12.5 x 12.5 x3" all components easily fit into the three drawers.
  • the top drawer 1214 is showing the multiple fittings that would be molded into the tray and not visible as a end view but instead as a top or side view. In most cases the manufacture would not have to outfit a tray and probably would not do so for all the possible connections for the laptop. However they are shown here and mentioned as all being possible. Reading from left to right the first connection would be for 14.vdc as a power input for the computer and is supplied by the bottom shelf tray from part 1214. On the top shelf again the next round circle to the right ofthe DC power connector icon the PS2 mouse or keyboard connection for an external mouse or GPS 1216 connection in some cases. The next comport is a 9 pin serial port and the following one is a 9 hole additional monitor port.
  • the infrared communication port and the very next one is a parallel printer port 25 hole LPTl port and the last one on the left is the a USB communication port and most likely the one that will be used with any peripheral hook ups in the box, however any of these connections might be used for any number of interface connections and it is possible that a laptop manufacture or secondary provider for the trays may outfit any and or all the communication ports with a service connector in the tray.
  • a laptop manufacture or secondary provider for the trays may outfit any and or all the communication ports with a service connector in the tray.
  • the bottom shelf or power tray as designed for this prototype will have two batteries one a 12vdc part number 1202 and a 6vdc part no.
  • 1204 receives it's power from a 120 vac circuit that is created from the host vehicles 12vdc supply of 6 amps and the PFN battery pack energizing an inverter of 250 watts, which also supplies 120vac to a plug prt.#1217 in the front stainless steel access plate for other devices that people might need 120 volts AC. , e.g., small heating blanket, coffee pot and/or hair dryer
  • the OCR optical character recognition scanning devices are OCR optical character recognition scanning devices and they are wired to a micro processor so that the unique digital signal from a scanned alpha-numeric image on any and all ofthe devices that have LCD displays, e.g., GPS, cellphone, pager and respond to any appropriately addressed message with the proper preprogrammed response as described in the first application.
  • LCD displays e.g., GPS, cellphone, pager
  • This scanning interface is only one example most all the of these C.O.T.S. devices have their own interfaces to allow them to communicate with any onboard computer they are connected to, e.g., serial or TTL, etc. And any ofthe IC components would be all part of a circuit if it was in the secure lock up as a mandated circuit function by law.
  • 1206 is a connector for a cellular phone, and on the back ofthe tray are a number of different sockets for data transfer cables to the 503 wire race or cable channel that goes from top to bottom in the containment.
  • Figure 13 is an interior block diagram as to how a card swipe or card swipe cell phone would be connected to one ofthe billing box or PFN computers and would then process the magnetic data stored on a card through the software provided by the card swipe manufacturers, as well as any credit card company proprietary security software used by the PFN computer.
  • An electronic signal with a preprogrammed dial up number to a credit card approval service company with any proprietary software to process the data in the remote location would be partially and or either held on the card or in the PFN software package depending on the type of cards and devices chosen to complete this remote billing and payment procedure, e.g., smart cards vs. regular cards, etc.
  • this mobile paying function ofthe billing box currently shown in Figure 8 is only the after market version ofthe PFN's total function to provide a means to pay for equipment use and any and all services surrounding vehicle and equipment use commercially.
  • This card swipe is another peripheral that will be on all manufacture vehicles in time as part of any PFN's to allow for a vehicle ⁇ equipment operator to pay for any use fees, uncontested tickets, or to log driver license information, and or pay energy fees immediately, rather than having to stop the vehicle to stay current monetarily for use ofthe vehicle or services.
  • the on board PFN universal RF receiver section will receive the signal and have a serial data conditioning ofthe signal encoder or this will be a function of the PFN computer processor and software through a special IC decoder ⁇ encoder card part ofthe computer hardware. Also for security the transmitted data will be recorded in the PFN memory systems e.g., hard drives, buffers or flash memory devices or MO drives or CD write drives, etc. as well as any remote location credit data management and storage system.
  • the ESNVIN number ofthe sending PFN along with time date and locator coordinates for the billing, charging, ticketing and acceptance of as well as any acceptance criterion for these transactions, e.g., electronic signature or hard copies generated by on board printers etc. which are turned in with a transfer of memory at the end of a shift or use of a vehicle or service.
  • 1302 is a cell phone that can either be inside the billing box or outside and only electronically connected. 1302 here is out fitted with a card swipe slot that can read the magnet IC strip of a credit card or a driver ID, etc.
  • 1320 goes to a PCMCIA modem to support data communication by a cellular phone for the PFN computer.
  • These actual connectors can be serial RS232 connections or IC cards configured into the PFN computer hardware mother board, euroboard or done with edge ribbon connectors etc.
  • 1321 illustrates a direct connection if the special cellular phone is already out fitted for data delivery in its circuitry and therefore would connect directly with the computers RS232 with a mere cable or utilize the new 1394 universal bus system or utilize any connection to handle TTL or the standard serial port PS2.
  • a function switch will send a firmware stored signal to the PFN to process and store the card swipe data in it's hard drive if on board or in it's processor buffer to be retrieved and sent via the PCMCIA modem to the cell phone and to the remote location.
  • this function could be manually contrived with the button first processing and then in another position sending it as data through the cellular protocol. Or this data could be performed through soft ware commands stored on the card and PFN or even in the cell phones firmware, e.g., D-
  • 1301 is a plain card swipe possibly one ofthe ACETEK series mentioned earlier as this invention's experimental prototype products. It connects directly to the PFN computer either serial PS2, RS232, or simple transistor to transistor logic TTL. 1306a merely depicts these interface options as well as shows the special cellular phone could supply its card data in this manner in one modality.
  • 1311 is a PFN computer and is one ideally with at least a 386 processor as was described in the processor and computer section ofthe PFN's described earlier. 1311 would also be programmed with all the necessary and proprietary software to complete these security billing procedures.
  • 1311 In the lower left corner of 1311 is a small square with the letter [B] this stands for buffer or hard drive in the PFN computer.
  • the number 1319 has lines that go to the little square [B] on 131 1 and to the horizontal square to the left.
  • the horizontal memory square is additional memory to keep a record of credit tans action most probably done with Sony memory sticks, how ever any of the memory systems described could be utilized and then erased by the proper procedures after any reasonable tie had past on questionable charge entries.
  • 1323 with a lighting symbol signifies a wireless cellular signal conditioning device for data transmission to and from PC's.
  • PCMCIA PCMCIA
  • 1313 is a two way data modulator for any RF transmitters, receivers, or transmitters, used to down load data from the PFN or in this case the card swipe protocol to a remote location or gateway, etc.
  • 1314 is a two way Motorola reflex protocol to down load data to a remote location. This would involve PFN software that could break up the data into 20 bit segments and transmit the data to a remote location that could reconstitute any lengthy multiple transmission into a complete secure text transmission if it is determined necessary to develop a secure algorithmic protocol for credit card data transfers.
  • Motorola is very protective of these transmission signal protocols already and this might prove a secure system if practically capable of handling the quantity of data in any commercial transaction.
  • the last square is a standard telephone data modem for computer data transfer, the little circled (H) stands for hard wired to land phone lines; and is listed hear to demonstrate that the PFN will be used with stationary equipment as well as mobile equipment and vehicles to value use and service related to use as well. 1318 shows the connectability of all these data conditioning and transmission devices described above and in Figure 7 and within this application and all related applications. 1318 also shows that the memory 1319 will store any crucial down loaded data to a remote location on board the PFN as well.
  • 1315 is a pager receiving station
  • 1316 is a cellular phone receiving station
  • 1317 is a radio frequency station and these are all wireless to land based phone node systems, they can be gateways or they can provide wireless communication through standard ISDN phone lines to secondary commercial, private or public entities that perform gateway functions, accounting services and or monitoring and or remote control function to a vehicle ⁇ equipment or any multitude of net work services as shown for all three wireless communication modalities in drawing 13.
  • these commercial, governmental public and or private functions and services listed in Figure 13 under each of these wireless modalities is in no way confining to a specific wireless modality. These services could function in any one of these wireless modalities and, in fact, use a multitude of them.
  • This Figure is a similar Figure to 13 but is included here because it comes from another related PFN application and it shows some ofthe consolidation of devices and components in a universal PFN. This is continually done through out the PFN applications to provide flexibility in constructing PFNS out of existing technologies and to establish a mutual organizational platform to perform accountable local interfacing. The progressive consolidation of these devices, components and modalities are well documented in PFN applications and all fall within the nature and scope ofthe invention. They are meant to be inclusive in the specifications and in the claims ofthe PFN invention. This was done deliberately to draw all manufactures into a cooperative effort to organize and standardize an accountable interface platform and system for machine messaging robotics and remote control and management.
  • this Figure depicts a universal PFN system with some usual device applications and varied hardware hook ups to communicate with the remote locations and physically perform the Accountable Remote and Automated Control for society and it's institutions.
  • the bold black line with universal PFN enclosed is to indicate that this is a protected area not just physically but legally.
  • In the enclosure 13al is a commercial off the shelf C.O.T.S. cellular phone it show one modality of connectable hardware through a PCMCIA modem connection 13a2 to the processor and internal TRAC ⁇ FACT software (these connections are detailed as standard hardware connections in all the related PFN patent applications or one of the new PFN uni-buss type connections.
  • the block called Complete Card This is a desired modality for cellular phone use in the invention. It employs a commercial off the shelf C.O.T.S. product a PCMCIA Complete Card TM.
  • the complete card also supplies its own software and hooks up in the same manner as a PCMCIA standard modem card. However this system also incorporates the Cellular phone system and antenna.
  • the appropriate hardware is known in the industry and the appropriate configurations can be accomplished by anyone skilled in the art to link up the euro 100 boards with the PCMCIA connections.
  • the bottom box is modem and can be part ofthe top box PCMCIA connection when used with telephony or with any application from the lower box 13a8.
  • Number 13a8 box shows all the different types of communication devices employed in the PFN's. 1 way Radio, 2way radio.1 way paging, 2way paging, light or sound and GPS or locating systems. These different communication devices are well covered in the in
  • the modem box also ha a small (S) in the ofthe box to represent super modem.
  • S small
  • I.C. components for processing signals data pathways are shown from the system under control (the open dots) as well as all forms of communications wired and wireless entering the super modem via the unibus caring all forms of signals that will be processed for one input connectable.
  • the PFN processor/computer with memory and modem will then be further consolidated into one device as small as a present day cellular phone.
  • this personal PFN communication device well detailed I all related PFN applications will be in many personal item forms with a variety of configurations and applications (belts collars, purses, briefcases palmtops. But they will all be multitasking accountable communication arrays.
  • traffic control devices were described for authorized personnel to control in real-time a particular vehicle by pointing such a tool to a specific target vehicles receiving plate and to control a slow guide stop and secure sequence for a suspect vehicle.
  • 13a7 is the uni-Buss connector that has also been discussed earlier. However, ideally an accepted industry standard will provide a universal plug, program and play capability and the TRAC/FACT software and TRACS management system will insure accountability and real-time control as needed. All possible present connectable hardware was detailed in the related application docket No. 112756-202. However, as stated before the plug, program and play capability for power sensing and control signals is part of this technology as described in Figure 6a as natural evolution of this invention. Whether it is for a mobile application (car) and or a stationary devices or personal PFN devices the control power and signals to the processor can basically use the same kind of plug program and play Buss connectable system. 13a3 is the mini-computer containing the TRAC FACT programs.
  • the round circle is for the CEW program Commercial Encryption on the WEB.
  • This software program is provided by the credit card companies and will have a special modem capability and handle 128/64 bit (presently and of course as more improved software protocols are developed the system and hardware will be altered to accept any new standard all with in the nature and scope ofthe PFN/TRAC system and invention.
  • 13a4 is a card swipe or reader that is connected to the processor either through the uni-buss or the old R232,TTL, or PS2 type of connections. These three are shown here as the present standard connectable set of modalities known to the present industry but are not limiting for the PFN/TRAC invention. However the un-Buss connector would be a more ideal modality for space greater data flow, and efficiency.
  • 13a5 is the hard drive on going memory storage.
  • the FACT applications specific event memory is not shown, but it is a redundant memory to the continuing running memory on the hard drive (or preferred memory storage as many modalities for memory storage in the PFNS are detailed throughout all the related PFN applications.
  • the event recordings are controlled either automatically by resident PFN programs, or remotely activated and controlled by an authorized external source (Logged command string) or by the resident operator or occupant. In any event all machine and man actions and interactions are recorded and logged in the FACT Memory preserved in the protected restricted access area as depicted and detailed in Figure 7,8,9,10 and 1 1.
  • 13a9 is a big dotted line, which is the uni-Buss going out ofthe PFN and going to activity controls video cameras (or Digital) microphones and activity sensors as well as generic host control connections or SUC System Under Control. Some of these sensitive control and sensor leads will be provided PFN protection special and or utilize the host vehicles strongest architectural structure (e.g. the frame) to protect these critical transmission lines. This should be determined application specific and as part of a standards effort. I have gone though a great deal of effort to detail all the properties and qualities and give modality examples to provide a standards effort a good clear organizational system structure and electrical interface platform to provide Accountable aggressive remote and automated control for society and it's institutions.
  • the emergency power system is charge maintained from a host piece of equipment or some other alternative source (solar Cells, land line, mechanical, or chemical, etc.) depending on the application and type of PFN). But it is protected in the protected encasement and capable of supplying power to the essential operations or control systems as needed or necessary functions.
  • the TRAC system can fail and there is no fail safe that can prevent all failures or tampering attempts, however as part of the PFN/TRAC component system is that each element can report it's last correct operating time, and data inputs, so that a record is made ofthe components time of malfunction and un-reliable operation for accountability and accurate use can be determined and assessed.
  • 300C in Figure 13a is the commercial server, who can be any gateway node the customer picks or can be a service provider for the OEM host equipment or an energy provider or a bank card provider or a communication company or any type or number of these commercial servers. However they must be licensed and provide enough mass storage to handle all critical TRACS/FACT data to operate in any geographic area. They also have to be able to handle it in a secure accountable manner. For simplicity purposes the 300C have been placed at the bottom ofthe 3 basic different types of present wireless communication. To the right cellular phone system, to the lower left of Figure 19 is the present one and two way paging systems and for the lower right is the Radio frequency systems.
  • Figure 14 is utilizing one thousand series numbers on this drawing because it uses the coyote relay systems (from an earlier filing) to activate the heater wire to release the seal to physically enter the safe box memory containment section of any PFN/TRAC System.
  • Figure 15 following this drawing is also using 1000 series numbers. This is a certified seal placed on a sensitive area by the appropriate authorities to prove an untouched record keeping for accountability.
  • 1025 is the security relay switch and can be a silicon relay with a gate lead 1033 or a standard mechanical relay where 1033 would be one ofthe leads to a primary coil the other terminal would be connected to the opposite pole in this circuit.
  • 1026 is a wire or thin piece of conductible metal covered in a substance that will melt when heated to 300 degrees F or something less (application specific) the prototypes will use a product call polysulphone which is a heat resistant plastic.
  • the inside of a PFN should never reach this temperature as it is insulated.
  • 1027 is the plastic well anchors for the seal with galleys to accept the liquid plastic during an authorized installation of clean memory and the removal of a untampered memory component. They are positioned structurally around the access door and are stamped with an registered ID number for legitimate access to this compartment.
  • 1034 is the negative terminal and can be provided a contact terminal or wire to ground in the automotive applications.
  • 1035 is the positive lead and it too can be provided a terminal or wired to a fused positive lead with the appropriate hard wiring and fuse amperage.
  • 1030 is the negative power lead and 1029 is the positive power lead.
  • 1031 is the processor and can send the appropriate signal to the gate circuit out fitted with a 1003 trickster circuit that is resisted to a set signal, or the processor can energize the other side of a mechanical relay 1025 and there by turn on the current and melt the plastic seal.
  • 10 32 can be used to send the correct electrical signal to switch the security relay 1025 and it's resisted trickster circuit also energizing the seal system separate ofthe processor in the event the processor has been compromised.
  • 1036 is the physical lock throws through the side ofthe PFN. These can be operated physically and or electrically if so desired.
  • 1037 is the key slot cylinder and this cylinder can be constructed like the new ignition cylinders and outfitted to read a resister chip in the key to activate the SR part 1025 in Figure 15 and melt the seal the seal is 1036 and it goes around the entire access door.
  • 1038 is the secure box itself.
  • the PFN box can provide interfacing protection and security to a lot of electrical components and personal property items, however the memory storage and any circuits responsible for TRAC routing will be electrically secured and physically secured in the certified or sanctioned area with lock ans seal to protect the memory at a legal level for evidence and or any legal proceeding
  • Figure 16 is a list of U.S. Government Agencies. And in fact it is actually a U.S. Federal Government Agency Directory prepared by LSU in a search engine format web page with hypertext and or mosaic or gopher software architecture so that the browser can click on any under lined department or agency and go directly to that specific departments home web page.
  • the purpose is to develop a public product for rapid awareness of one's physical and economical environment from the local to the national level to greater insure the wise use of technology investment and create a more politically interactive public that can voice its views economically and by public comment through electronic polling in the most efficient and clear way.
  • Figure 17 is the entire inventions control system from the Primary Focal Node and
  • PFN's can have more than one purpose, e.g., they can be used to bill for service or a particular service of a machine and simultaneously be gathering data on an incident or accident even controlled by off board control systems.
  • PFN Primary Focal Node
  • the icons from the top left are trees with a (PFN) box to monitor the environment, weather, air pollution, etc., either sensors or video camera or any number or types of sensing devices. This box is given a squiggly line to indicate a wireless transmission.
  • the invention will add communication to them if they do not have it and return their data in real time to the agencies that are to govern them and any private or commercial operators of this equipment could be given a tax rebate.
  • the agency will then pass the data on to data management for posting, CCing and any proper storage determined by any governing software.
  • the PFN's software will be configured to retrieve the data in an easy to handle format to simplify this process. Part ofthe accounting system is to be able to support this mass data acquisition system with out breaking anyone group, e.g., the individual, the governments, and or any commercial enterprises.
  • the next icon up on the left is a generating plant and it shows a direct black line going to the commercial servers semi circle.
  • This is a land line phone link and also a squiggly line to indicate a wireless transmission if needed as a back up or more cost effective modality, etc.
  • the invention could list here all the standards for air quality for S02 point source standards, particle point source standards, NOx point source standards, all the green house gas C02, etc. However, there are government agencies and private watchdog groups already involved in monitoring this and they have established standards which can be used a s a starting point.
  • the invention will house all the appropriate sensor arrays to detect these toxin or just the "Nose a NASA development along with a communication link to these agencies to insure real-time compliance and report any amount of violation. Much of this data already exist and can be easily prepared for the web account pages.
  • the next piece of equipment is a bulldozer and most ofthe time there is a limited amount of construction equipment but because they are forced to work in dusty environments and therefore are incredibly susceptible to clogged air systems which causes an increase in rich unused fuel being partially burned that deliver a great deal of pollutants into the air.
  • Farm equipment as well, is inherently a dusty environment and also these pieces of equipment are in many cases working with food products and should be monitored for toxic fluid loss as well as any storage tank facilities for fuel pesticides and or concentrated fertilizers. Both construction and agriculture will be serviced in the most part by wireless -pagers with small short range fm transceivers and processors as described earlier.
  • the RF transceiver is for networking all monitored farm equipment to one land line, transceiver where ever possible and the pagers will be used for inexpensive longer transmissions, also this will provide for the repeater function of a short range signal to a long range transmission or telephone communication line, e.g., people locator (Child find).
  • GPS systems are employed by Archer Daniel Midland (ADM) for the governing of irrigation and crop monitoring from satellite systems.
  • ADM Archer Daniel Midland
  • thee systems could be interfaced to return accurate crop data back to the government and to send aid and services to help a farmer or farming district in trouble due to weather or blight etc.
  • the farmer could be given a tax break with respect to crop investment and loss.
  • the data gathered in a specific area was used for public use or commercial use the farmer could be reimbursed for the access to their electronic gathered data.
  • the next icon is a factory and depending on how many pieces of equipment and the proximity they are to land lines these pieces of equipment may also only have a short range radio transceiver that is in communication with a secondary node with in the company (land based line) and reports directly to a company control system in which these machines are monitored and recorded for their operations, but can also be provided instructions from plant management directly to their operators or are operated robotically without operators.
  • This in house network system could provide a data link for service contractors and show a history of operational readings which when run through their software diagnostic programs and or those programs owned by the factory would limit the repair choices and suggest the materials needed to effect an appropriate repair. This would be a great time saver and money saver.
  • the ESNVIN would also have a special tariff smart card number already swiped into the cars PFN which was bought earlier, this national card only pays for tolls and gas or use tax or commercial cards can be used when they are accompanied be encrypted transmission and reception for security. And, of course, for the interactive highways or any smart cars to be a reality for society they will need to process all their remote control instructions through a secure PFN that can record and account for all the robotic actions for any legal decision involving a driver accountability and an automated systems liability.
  • the tower and or ai ⁇ ort facility is normally well endowed with environmental and weather sensing equipment and all this data would be also segmented by agency protocols and CC for the proper mass storage and also presented in the public account web pages.
  • agency protocols and CC for the proper mass storage and also presented in the public account web pages.
  • Also at 8 o'clock on the MMNWWW local node gate way protocol is a icon for the interactive high way and in most cases this will act as a primary local node to down load any PFN data that is standing ready for data transfer in the PFN Buffer an has been CC to it's PFN's unit storage.
  • the first ring is the commercial communication server and MMN gateway via Land line systems. More and more in the future standard phone systems are going to have faster switching and for any one to operate a commercial node they must have all their phone support lines be Asymmetric Digital Subscriber Lines (ADSL).
  • ADSL Asymmetric Digital Subscriber Lines
  • the second ring in and the first ring provides any emergency service if the PFN did not call or was not able to reach an emergency service phone node for some reason.
  • the commercial server will maintain any and all contact, e.g., voice and data links till the customer is served or connected to the emergency personnel, otherwise the second ring can provide any number of services from making web connections to down loading entertainment packages for the board driver.
  • the next three smaller circles are for energy accounting and environment, transportation and traffic, and the criminal incident reporting system.
  • the voting node allows for the public with their special pin Id to vote on the road or in the home. Originally first to respond to issues as they drive home to let their representatives know how they feel on the issues that are at hand. They can view them in their cars on LCD screens or see by hologram wind shields, and hear data delivered by voice. (Not Radio) This system would be developed to sanction a vote with a positive finger print ID and or an accompanying pin code. Also a driver could send a voice mail that coverts to a written message to address an issue on, e.g., area roads and specific conditions.
  • the two inner circles will be a continual running account of commercial and public cost and gains so an area can judge how well it is doing and also to determine where best to invent or create its finances and use its resources.
  • This data would primarily be gathered over land lines and this accounting system could be used to make cases commercially to communities to lower taxes or provide support aid in a lean time or help to retrain workers in an eventual lay off. This is not the way business is done to day but it should and could provide a better way of life without stress for all in the future. Business would learn it's local community can help guarantee its survival even if it has to change the way it is doing business.
  • the inner center ofthe top semi circle is local government and all the way down through the center of the drawing is government with three pegs interlocking the local government the state government and the national government with the local account web pages that are displayed as local, state, national and international web pages.
  • the pegs have letters in them and they spell out REPS for representative or the elected officials.
  • the objective here is to integrate the process of individual power and responsibility for any one representative to be directly responsible to the empowerment structure held by the public individually.
  • the lower section semi circle is the delivery of data to the web account pages with government numbers on money spent and received locally, in the state, and nationally, Stock reports and financial reports on the local commercial companies, the regional companies and co ⁇ orations, and the national and world stock markets.
  • the bottom semicircle there are four web account pages that anyone can access from commercial servers communication data links, the world wide web or mass media. Most all of these support response back systems even cable TV with a web box, although there is still a lot of problems getting service to all citizens so access could would and should be provided at any responsive PFN that supports a video display. And in public places as well like police departments and libraries.
  • the four web pages would list issues plainly for the public to view and respond to. And their would be a section to frame issues in which the public could start a question.
  • the Figures from left to right at the bottom of the page are agriculture being remotely controlled.
  • the highway systems being monitored and ultimately remotely controlled,
  • the car is receiving remote service and the house being monitored and for it's energy use.
  • the computer is a web access, the TV at 6 o'clock is mass media with a web response box.
  • the factory can review all that is on the web as to the public opinion and government policy and the world receives all the data from every where and all the world populous can see how the planet and the other humans are faring around the world. And for this to take place all the national governments agencies must clear the data to be freely posted. Well at least they can start some of this.
  • the Component FACT can be in the form of a physical micro-controller chip or smart chip or it can be imbedded as essential software programs or commands (engineering discretion for components and products).
  • a devices software or firmware initialization command string that is needed to activate any operating programs e.g., ( windows level programming above BIOS but only leaving special DOS access commands still functional and or the same or more secure for any improved operating software in the future).
  • This point of operational interception would control the operation of any component, or device in the PFN or attached to it e.g., (activity controls, communication devices and audio systems etc.).
  • the only initial responsive data any accessory FACT component could transfer would be ESN or identity information to the PFN Trusted Remote Activity Controller processor.
  • the individual FACT component is integrated and or interfaced with any silicon switching relay and or every power regulating circuit or it can send the necessary command data to signal the FACT accessory, component or device to go into sleeper mode or to turn off, or to operate at any level remotely directed level or fashion by the FACT registry and or any preprogrammed protocols.
  • the FACT chips or system programming will be installed as an integral part of programming at the manufacture or the boarder or by custom clearance centers of any given nation state as is determined best and or efficient by the governing authorities (or a combination of both) for any and every electronically controlled piece of equipment, device and or commercially available circuit that can be interfaced in any PFN to be part ofthe TRAC, FACT system including FTP, CEW, etc.
  • the FACT system will be able to interface into any control circuit and restrict operation through a chip or embedded software and direct all input signals and out put commands as well as preserve these commands to a designated onboard memory that is also provided time, date, location and the author of command (pin finge ⁇ rint ID or iris eye from the FACT registry) as well as the command strings and all responses there to; be they automated or due to human activities.
  • This same data will be stored in a remote redundant storage, and all the same identification and system data for the FACT component will be stored for the new user or installer at the point of initial activation.
  • the individual software will be capable through PFN interface communications to provide their stored data (firmware or flash memory) to the National Registry upon a new installations and will be able to immediately in real-time report this data. Once the data is receive and processed it will be checked to see if it has tripped any alert flags. If there is no criminal or suspect security flags the registry will record the new FACT component installation with accompanying (PFN operating inventory)to the appropriate PFN file in the main registry's mass data storage and apply the appropriate taxes and fees for the product installation and use in the correct geographic area, (registry will be nationally networked, but can be operated locally if governmental structure mandates this function for tax collection).
  • This FACT program will provide a secure command string and access path from the origination to any mass memory storage system that is search-able from the National Registry by any appropriate authority or agency.
  • Some Fail safe security for the system is provided by the component software of FACT at the application level establishing a handshake with local memory in the PFN and legitimate remote registry equipment with a secondary integrity check from prior legitimate registry contact data. (Possibly a Random code number established in the last contact between any specific PFN and Registry to secure and certify all re contacts as genuine and legitimate un-altered PFN/TRAC links). This would be apart of any initial communication after a corn-link was established.
  • the registry will provide all public providers and commercial servers with the alert flag data so any receiving system will be able to inform the PFN of national security alerts for potentially dangerous devices (terrorist altered components that could be used to activate explosives, chemical, or bacterial or viral microbes contaminants) through the commercial (PFN) remote and management control systems.
  • PFN commercial
  • the appropriate authorities would be alerted to any ofthe national security high risk installation attempts in real -time.
  • the immediate action could be performed by either predetermined automated protocols or by realtime commands handled directly through the appropriate authorities. Because, the exact piece of equipment can be ID by it's FACT chip along with all it's Original Equipment Manufacture OEM's firmware (Lot No.
  • TRACS/FACT programming will be issuing Stolen alert bulletins, and or any security alert flag at periodic times for PFN's to do internal integrity and security tests as this information is reported or becomes available. Otherwise, any device, system and or component will be assessed for it's legitimacy and real-time use at the time date location of installation along with the PFN ESN and what ever other data is determined to be applicable. At this time it will be appraised and billed to the responsible party for it's use and impact on society, it's infrastructure and the environment.
  • the primary pu ⁇ ose of this singular identity component chip is to track any and all use ofthe attached device and or component that it has been inco ⁇ orated into and to report any and all data in a complete and integral fashion, as prescribed by any code, regulation, law, and or standard decreed by any sovereign or governing authorities all as part of real time programming or preprogrammed protocols running in the local PFN/TRAC system or the registries (either local or national, etc.) Number one position (left) ofthe octagon is the individual ESN or the Electronic Serial
  • each accessory or interface FACT component will have it's own ESN or Identity program and will be entered in the Fact registry at the point of manufacture and will give its ESN program to the Local PFN on every start up and given to the Registry at any new install or recognized alert status protocol flagged either by the component the PFN or the remote registry or service center.
  • Number 2 in Fig 18 can be like the SMART CHIPS and or a magnetic strip and would provide as part ofthe components unit packaging and or as a bar code so that an immediate physical check ofthe component can be search either by a OCR scanner or a hand held magnetic strip reader, or IrDA, etc.
  • OCR scanner or a hand held magnetic strip reader, or IrDA, etc.
  • IrDA hand held magnetic strip reader
  • Number 3 is the universal plug and play buss inside the PFN containment that creates the electrical interface platform for all the components.
  • This buss will carry the appropriate power connection and control connections from the PFN/TRAC/FACT controller to activate, deactivate or specifically control any and all components.
  • Power can be cut off to a specific component through the BUSS or it can instruct the individual component's FACT CHIP or program to intercept power (power input or regulator circuit.
  • All the electrical connections in vehicles and equipment are need of standardization and I have written to this in all my previous applications and these are areas that will be a standardization effort in each industry and or application specific use of accountable remote and automated control. I have addressed how to complete these functions with present hardware connections firmware and software and have created some new modalities to interface all the present devices.
  • the components and technologies are merging and this universal plug and play BUSS in the PFN is an ideal way to make compatible this electrical interface platform.
  • FACT CHIPS must provide firm ware or stored data of identity, OEM data, last application, etc., to comply with any standard or regulation developed for a national registry or any such security system.
  • FACT is a major part ofthe main operating system in TRAC it's software is also modular and can be in any form or hardware application.
  • the hardware chips and firmware modality detailed in this application should in no way be considered the only modality to create a nation wide security and management that is capable of real-time control of individual components, devices, and equipment. However, any other modality should be considered within the nature and scope of this invention. And this is area #6 of Figure 18.
  • the chip also can perform activation and deactivation ofthe component and that is what is meant by saying it "must provide control"
  • the 3rd triangle 0- infinity frequency refers to any and all kinds of Radio Frequency equipment (including cordless phones and high quality and high powered RF equipment equally capable of providing large data streams modulated on their signals.
  • the 4th triangle with the word locate can be either cellular phone poxcimetry tracking, GPS, Lorands, LoJack or par of any interactive highway controller system or master surface transportation control net work and system receiver and or transceiver.
  • the 5th triangle is a miscellaneous communication receiver and or transceiver that is responsive to light, sound or any discernable electromagnetic wave or transmission.
  • TRAC is of course the Trusted Remote Activity Controller a modular based software program of which FACT the Federal Access and control Technology is an intricate part. These programs are run by the PFN min-computers and they send their commands and direct the data received by the uni buss to the appropriate data storage.
  • this universal Buss can extend outside any protected area with the immediate electronic protected capability to recognize and protect against any deliberate shorting or questionable interface.
  • the universal buss illustrates it's capability to handle power as well as in put and output control transmissions. It is also important to make clear that this involves a universal secluded antenna buss or reception will be provided for by certain types of physical structural elements in the PFN's structure to allow for patch antennas or physically small profile antenna structure to function with in any standard regulation or legally prescribed manner.
  • DBC Data Network Connection
  • Internet connection or a world wide web Internet connection (encrypted if applicable) with the number 300 above indicative of any local and regional network as is evident between the left national box and the box on the right side of Figure 18 which is termed Local Government Activation and check System.
  • DRC National Security
  • Public safety other than individual input which in most cases is provided to either one of these node as would be any international requires, which will always first be edited through the appropriate national authorized channels.
  • the National Registry will be a large routing system for mass management with only a system processing storage protocol and system that will handle data in a prescribed and secured manner through any and all ofthe 6 transparent IP layers to the appropriate seventh application layer detailed earlier where it is transposed by the application encryption to insure security. This will be the same for all forms of communications wired and wireless as they are processed through their respective communication nodes and gateways (licensed Providers and Servers) to land lines, fiber optic cable systems or land cable systems.
  • the center three blocks are the facets and functions ofthe national and local registry for government, to develop security for all in the nation and to provide better public safety and to build trust within all of civilization, because of accountability and fairness.
  • This is a safe guard system for man and machine messaging that is accessible by all of a nations society first individually through internet connections and if not accessible at least by any portion of civilization accountable to all involved parties through comment or constitutional procedures provided in the TRAC/FACT software. Internet dialog and media awareness for all types of media (mass and individual) as well as responsive and public access and input will spawn a much more involved individual citizen and functional democracy.
  • the first center block is termed AUTORIZED INSTALLATION REGISTRY. This may be a network of secured computers in different locations or it might be one system in none location.
  • pu ⁇ ose is to create realistic functional modality that can create this national and local registry level of accountability presently out of existing computer systems and to project some future consolidations of local nodes for related activities and data to help structure efficient data communications for all the government agencies an commercial services.
  • the Actual structure of course will be part of a large standards effort and civil legislative effort.
  • the PFN system can help to develop trust to insure an accountable answer to all of Societies legitimate concerns first for individual survival and then to be part of a mutually healthy co-existence with all of civilization, and all forms of worldly life.
  • the Authorization Installation Registry function is to record and make available by request and or to recognize any PFN use of an electrical device in conjunction with the PFN and first run a compare function to any and all legally known produced, and legitimately marketed products in a legitimate sovereign locality through local and or toll free telephony or RF or MISC. communications technology employing isolated network connection and or the Internet (IP).
  • IP Internet
  • the authorization installation will require a complete OEM specification and description that can be used to specifically identify individual devices and or components (Requirements to be determined by the sovereign authorities). This data will provide depreciating value levels and integrity checks that will be beneficial in tracking use and varying performance for securing public safety. Also the depreciation schedule will enjoy a diminished cost of operational tax relevant to the products prior use and or time of use. This provides a use tax not a sales tax for governing structures to apply to real time use. This frees the Internet to trade and free communication for general transactions and allows for the legitimate taxing structure for actual impact on society's infrastructure and environment by machines and the work they do
  • the second block is the Restricted Authorization or Crime Registry.
  • This data is supplied by everyone and anyone but primarily cleared and reviewed by the national and state or regional governing agencies.
  • the really great part of this section ofthe system is that the private individual can in real-time participate in a personal injury theft by telephony with scan data or through personal contact with law enforcement agencies. With total accountability all parties will have to face their own actions in the proper legal settings. And basically there will be no use or miss - use of stolen property.
  • the third center block deals with the communication capability. Ideally this will be accomplished by toll free telephony or RF nodes for the public in using the publics privately owned equipment and PFN link ups as a hospitable commercial service with all other gained accessible service options and provided free by government or public providers for the tax and public interest previsions.
  • the 4th block in the center of Figure 18 is the cente ⁇ iece of my inventive technology for each individual piece of equipment in this machine messaging net work.
  • PFN Protected Primary Focal Node or PFN created as a protected electrical interface platform to merge, focus all host equipment's accessories and component's power and control circuits into one local accountable control and communication center.
  • This PFN on every vehicle or piece of equipment is then linked, coordinated and managed with all other machine use and activities by a greater mass communication and management set of computer network systems (through RF, telephony and nodes or gateways) either for surface (land and sea) coordination and or for aviation.
  • the PFN gives the commands to the individual chips via the universal plug and play buss. And retrieves their essential operational data, e.g.,ESN, and or MIN and production Identification and seventh layer application security instructions from the ISO OSI networking Model.
  • the PFN computer will signal or request information from the individual FACT chip in the sound system (SS-ESN-F). This can either be sent by isolated control hardware (wires, etc.) or by sending a modulated digital signal on one ofthe power legs or it can be accomplished by short range transmissions if this modality is employed in future wireless vehicle and equipment control systems to ease plug and play capability and reduce the need for so much hard wiring. No mater the means the PFN will inquire for an individual fact chip as soon as it senses current draw. If there is a change in current from a normal operational level the PFN will request and or review vehicle conformations for any trouble codes logged in the charging system or any battery draws or charging problems. This is performed by a TRAC software algorithm
  • the bottom ofthe triangle has LOCAL GOVERNMENT in big bold letters. This is done for two reasons. First local node and gateways will keep cost down for Registry network and second regional state and local government is the agencies that impact the individual in most cases. As has been detailed earlier in Figure 13 all the government agencies are now maintaining web pages and data phone nodes and through basic routing using ISDN of Cerent Industry new fiber optics and Cisco systems routing capability these agencies can be given an efficient data management for local regional and national Data base connection and inter agency connections as well to allow for the fast local discrimination of data as well as provide much of this general data on the web for the public on or through the media
  • the call in received by the PFN data from the new component check compares the ESN and manufacture data to OEM supplied registry lists and known crimes of stolen property registered in the registry. If all is clear the registry approval is given and the transmitted back to an approved registration program in the PFN.
  • the plug program and play the initialization program in the PFN/TRAC System adds the new ESN to the start up sequence in the PFN computer and installs any software drivers or interface communication links for the new device to function in the present PFN/TRAC system.
  • This software (by manufacture and product engineering discretion) may be imbedded in the devices software (or firmware) or the device maybe accompanied with software to be downloaded e.g.by floppy of Disc etc. or a second number from the registry call might be made to an automated IP manufacturer node or web site for the manufacture to down load the appropriate drivers, etc. and be able to keep track ofthe devices new service and owner.
  • the component In the registry the component is listed as it's appraised value for new or resale value tax taxed and shown on the display for the operator and or owner ofthe host piece of equipment to approve or refute if provided for and determined by law.
  • the same redundant data is sent to the appropriate governing agency and a tax bill is prepared, unless the operator decides to pay in real-time with either with a credit card or bank debit card via a card reader in or on or attached to the PFN.
  • the entire transaction is timed dated and the run status is added to the inventory list ofthe vehicle or piece of equipment.
  • a return E-mail address can be sent to a home unit for printing or memory storage or printed on location from the PFN or down loaded to a Lap top and printer or an accessory printer attached to the unibus or one that is resident as part of an application specific PFN/TRAC protocol.
  • a simple theft protocol might activate the unit normally with out notifying the local user and alert the appropriate local authorities to the location ofthe stolen property to first regain custody ofthe stolen property and inquire as to how the person gained possession or received the property or as to how it was attached to the present PFN/TRAC system.
  • the Fact program will basically be operated with the Justice Department the FBI IBSR incident base Reporting system and The UCR the Uniform Crime Reporting system and it will be part of this technologies Spider Eyes system and will be totally accessible to local law enforcement and even the general public through national state and local agency editing as justified.
  • all crime activity will be given ID's either IBSR-UCR or local and all data can be retrieved from the mass data in any discovery to make everyone accountable for all decisions and use of data including editing from the public- MS is the mass storage in the TRACS/FACT system.
  • this drawing is self explanatory and I have outlined in writing what would be inco ⁇ orated in any software algorithm as well as how humanity will be able to legally use this technology in a constitutional way.
  • Figure 21 is a possible software flow chart for authorized Interrogations of a PFN/TRAC systems.
  • PFN accountability provided by the redundant memory storage functions makes it possible for events to be monitored with a greater accuracy and force to maintain and protect the individuals rights to privacy and integrity and allow improprieties to be redressed and rectified through compensation to those who may have be damaged.
  • Figure 21 is divided into two sides. The left side is what is going on in the PFN and the right side is what is happening in the registry network. Both are running known activities to the driver/operator or owner and both can be running unknown polling or surveillance functions. These are all in a direct relationship to how the law functions in the United States today. The only difference is they happen in real -time at the speed of light or electricity. Therefore they can be more intrusive in an instant and or more dangerous or equally perform lifesaving functions.
  • the second level of PFN system interrogation is not under the control ofthe owner and operator and is a function of law enforcement. It can be performed with or without consent and it can be performed with or without knowledge of it's function. But it can not be performed with out the proper authorization from the proper authorities and or without accountability both locally and remote. Law enforcement alone is not capable of performing this function-it requires the justice department and judicial branches of government (both local or national as applicable). Judges can view the process and stop it in real-time if their order is violated. The only exclusion to this procedure is a National security alert which relies on the appropriate governing authority and agencies to respond correctly and in as rapid a manner as possible. However local as well as remote system recordings should be maintained for review but latitude should be expected for these emergency actions by all individuals while reviewing their constitutional right to ask for a civil suit and damages should be weighed with the gravity of any particular situation in mind.
  • this software flow chart starts in the TRACS System or in the main registry.
  • alert flags are generated with the correct FACT ESN and case number for fast cross-referencing in the IBSR or the UCR operated nationally by the Justice Department's FBI.
  • the general public will be able to file an automated report through area government operated web pages and Internet nodes or PFN/TRAC/FACT access as well as in the traditional manner with the area police department.
  • FACT cards held by the legitimate owner will allow for rapid scan in or card swipe by a magnetic reader.
  • this diagram is portraying a FACT scenario for a stolen device or a device determined to be of danger, e.g., like a part of a subversive weapon system to perform a terrorist act, etc..
  • the everyday use would provide local operator notification from any manufacturer that registered a defect or recall of merchandise order or even perform real-time repair via electronic augmentation or reconfiguration if permitted, possible or required.
  • Any local PFN/TRAC/FACT configuration will have routing for and to local law enforcement for real-time responses through IP connections, RF repeating or Digitpeating, wireless, telephony and paging systems to handle the detailed Spider Eyes program in related PFN patent applications.
  • This responsive networking as described earlier will utilize all vehicle and equipment audio video systems and pertinent telemetry and tracking data in a prescribed geographic area (boxed and clicked on a calibrated map) to follow a real-time crime, e.g., for real-time recovery of a kidnap victim or pursuit of any crime in process.
  • a box is drawn on the calibrated map ofthe control center for local law enforcement a FACT communication signal will be sent out on RF, wireless phone and paging systems so that every PFN no matter what communication array will be instructed to respond if it 's TRAC program determines it is in the geographic area.
  • the PFN will also respond with it's assets like if it is operating video systems etc.
  • PFN/TRAC/FACT systems will be contacted through radiuses of physical address and by ESN numbers or communication numbers or designations or vehicle tag numbers all through a gigantic compare list algorithm running in the mass data and management systems of FACT and all the related agencies.
  • Priority in this case is assigned and implemented as a public safety emergency.
  • Other software Protocols algorithms in the PFN7TRAC system will be assigned for general pu ⁇ oses and complete similar routing functions but as service and not at as high of a priority.
  • a special set of protocols for interagency networking and data access or files will be constructed for public safety and national emergencies. Even the investigation of petty theft will be protocoled at a lower level of routing and resource use.
  • DOT, Highway Safety NTSB would support a set of nodes in a transportation web for the nationwide web to provide traffic management as part of any interactive highway system directly along interstate corridors.
  • TRAC/FACT gateways and IP connections from any interactive highway system interfaced into the FACT system to be part of an integral part of law enforcement including the EPA.
  • the cellular and wireless telephony system has well saturated their development along these traffic arteries and are ideal components to help provide additional ground signals to assist in automated triangulation in conjunction with or with out GPS data for accurate land platform guidance algorithms running in TRAC.
  • these TRAC programs will also process local video data and highway RF beacon data or use the electrical signal form any sensors of magnetic markers and distance sensor signals on board the vehicle to be responsive PFN/TRAC management computer as has been detailed in earlier related PFN applications. Similar application specific systems will be set up for travel on waterways and the high seas and aviation communication will be tied in as well.
  • This Figure is of a personal PFN/TRAC system which can be used in home management control security commercial management and mobile management, however the later is probably not as needed to track personal assets People and Pets because most all mobile PFNS on equipment will have tracking and accountable telemetry.
  • the personal PFNS and tracking devices have been singled out in a later application filed presently as a provisional docket # 112756-700 to better develop the PFN technology commercially and legally as it pertains to society.
  • Figure 23a, 23b, 23c, 23d to substantiate with specifications these products and subsequent claims.
  • Personal PFN/TRAC products can be belts bracelets, articles of clothing and or personal items either attached or carried by a person, animal or mobile object.
  • This system would allow for parolees to be back in society while their movements and activities were monitored and governed by an automated computer system that would track physical movement through GPS, or LoJack or Cellular and or RF triangulation on a personally carried device that monitors body temperature, pulse rate and provide for positive Identification, e.g., Finger Print or eye iris evaluation
  • the device would be controlled by the master controller and support local Web page access and hyper-link capability.
  • Tactile and galvanic sensors would be capable of detecting chemical changes in perspiration and determine the chemical equivalent for a specific person drinking and provide a specific electrical signal that is transmitted back to the parole center for a con beep and direction to either report in or take a skin prick check or a breathalyzer.
  • Locations of area liquor dispensing or known drug activities and be plugged in as trail markers on the GPS and flag a convicts questionable activities or ask for the above checks.
  • Prior victims of crimes that an Ex-con is convicted will be notified ofthe TRACK A CON.COM and the Con will be given a reasonable distance to stay away from the victims.
  • 2201 is a bracelet or belt to attach the personal PFN or tracking device to a suspect criminal or child or anyone for that matter 2206 is the unit itself with a finge ⁇ rint thaw that can insure that the correct person is wearing the unit.
  • the system could have an iris recognition device, pulse sensor galvanic skin sensors, contractor for skin prick or breathalyzer system that can monitor the wearers activities and body reactions.
  • There could be any ofthe different communicating devices as listed and a processor and memory storage all application specific but basically taken from all the technology contained from all the inventions related patent applications.
  • the power source could be a battery or the electrical power could be provided by contrasting metal inserted into the body of a human and basically use their body as the power source.
  • an entire micro transmitter system could be place under the skin in another modality with no belt at all.
  • the antenna 2303 the antenna lead would be inco ⁇ orated in the belt.
  • 2305 is the battery. This is being brought up with a new drawing presently but numerous modalities for this separate invention has been detailed in earlier patent applications. It is important to remember that these monitoring and management systems can be either, ether nets, intranets of any size and or interfaced or operated on the Internet depending on the type and range ofthe wireless equipment utilized as well as the application desired.
  • 2306 is the personal PFN encasement and application will determine it's configuration and structure. Many security seal systems and security features are detailed in the subsequent 23 series Figures for personal PFNS as well a detailed in other related PFN patent applications. Also inside this containment is the local memory. And 2301 is the belt strapping or band.
  • FIG. 23 shows the use of a PFN with a tight intranet and Internet capability for the victims ofthe parolee in the past.
  • the PFNS will be used for watching children, or for nursing applications, and tracking people or pets in any telemetry application or performing accountable remote control and management activities
  • FIG 23a depicts the first of three major different communication modalities.
  • This Figure deals solely with Radio Frequency (RF) equipment connected to GPS equipment and interfaced to modulate NEMA location data strings by modulating, either ASCII, TTL binary coded messages or any communication software over radio frequencies.
  • RF Radio Frequency
  • This diagram depict the modality used in the present the personal PFN prototype. The drawing is general but clear to anyone skilled in the art to recreate this invention for personal tracking. It also should be noted that there are many modalities to achieve this same RF Product but any and all fall within the nature and scope of this detailed invention.
  • Object 23A01 is a two way hand held radio in the case ofthe prototype it is a small family channel walkie-talkie operating in the frequency range of 462 mhz-467mhz.
  • the dark line between 23A01 (radio) on the left and 23A02 the modem on the right represents a Mic.
  • Line and a Speaker line as well as a signal ground line.
  • the right end ofthe mic line connects to a serial input pin labeled TXD for transmitting data and the speaker line connects the RXD for receiving data from the RF component.
  • the modem in the present prototype is a Kantronics 1200 RF modem and it has a 9 pin serial connector provided in the standard configuration for receiving and transmitting data as well as supplies a pin for the signal ground the last connection for the right end ofthe left wire.
  • the line to the right ofthe modem has a 25 pin connector that goes to a 9pin serial DB connector in the back ofthe computer #23A03.
  • the 23A04 is a second walkie-talkie also having a Mic port and an Ear port set of jacks. This time the Mic TXD line from the radio is connected to a Tigertonics Module 23A05 which is a quarter ofthe size ofthe 23A03 modem connected to the computer. This is accomplished with a Jl 1 phone jack the same as used for standard phones and also used in this technologies first vehicle PFN prototype to stop the unauthorized use of a vehicle detailed in earlier related patents. This jack has TXD, RXD and signal ground connections provided through a removable Jl 1 connector. The input side ofthe Tigertronics module 23A05 has a 9 pin connector that can be connected to a GPS antenna object # 23A06 in the drawing.
  • the modem circuit or demodulator 23A02 will be on the same IC with 23A01 the radio transceiver or receiver component.
  • This system can also have a AC power cube /DC converter for 6-9vdc to either charge the radio/demodulator unit or just power it.
  • this system would either have it's own power source or be able to receive power from the power pin on the DB9 connection on a laptop for mobile movements.
  • this product for personal tracking only has to communicate in one direction.
  • the personal tracking portion on the belt need only a transmitter and a modulator with a GPS receiver, and the monitor portion only need a compatible demodulator and radio receiver with the interfaced computer and viewing monitor.
  • Power is provided by either a rechargeable battery pack on the belt for the mobile operation with (accessory solar cell strips with velcrove stick-ons for hat or shoulder pad mounts that plug into the belt power pack.
  • a temperature sensor on the battery packs disconnects the solar cells if they reach 109F (experimental charge regulator process for Ni Cads, Lithium, and Alkaline. Temps for safe charge not equated at the time of this provisional).
  • Power first enters the modulator23A05 the passes though the power switch and fuse and then enters the modulators voltage regulator circuit and is passed out pin 9 on a standard DB9 serial pin to energize the GPS receiver.
  • Battery ground exit Pin 7 to the GPS receiver completes modem and GPS power requirement with additional 5 volt regulator installed to adjust power to energize the hand held radio unit that is interfaced as the transceiver.
  • Other components on the belt system will provide a locking clasp and security line that detects the real-time removal of the belt or tampering and reports and records this activity for authorized conditional freedoms etc.
  • the software running 23A03 the computer to utilize the NEMA GPS location Data generated and received thus far are as follows.
  • the initial software to handle the RF modems software NEMA code data is the Automatic Position Report System (APRS) software shareware protocol.
  • APRS Automatic Position Report System
  • This program converts the received data into GPS coordinates to generate and object on a calibrated map.
  • APRS Automatic Position Report System
  • maps can be created and calibrated as a library file and the APRS software will pace the tracked object on those Map.
  • the zoom feature serves a most necessary pu ⁇ ose and function of these personally worn locating products, which is to instantly and continually acclimate the viewer to the area.
  • a third piece of software was required to make this a great product.
  • the objective was to zoom in on each update and hold the zoomed in position in the center ofthe computer screen and repeat this process at each update (timed at 9 seconds for the prototype - but adjustable).
  • the present prototype zooms in from a approximately 7mi radius to an area of less than.1/2 block. This is accomplished by using a Macro and keying the computer key board function to zoom at the desired time to the most detailed bit map in the library.
  • Kline and Walker LLC in the development of these products will work directly with the calibrated map companies like Delorme, Garmin, Fagawi, Tiger maps and or any government mapping programs etc. to accomplish these functions and make these personal PFN commercial products more user friendly for the general public.
  • These functions will be easier to create through the proprietary software commands after knowing with the correct software codes. This is the main modality to make these products user friendly.
  • this range can be increased by different radio systems, repeating or digitpeating though other radio stations such as amateur radio or ham operators, or by repeating through other PFNS either equipment PFNS or these personal PFNS that can pick up transmissions through programmed scanning capability or by programmed digital transmissions which respond to emergency protocols or digitpeated commands as a transmission string.
  • This software is running in the APRS shareware program.
  • the hardware consolidation into an integrated circuit configuration for these interfaced components or devices is a regular activity for anyone skilled in the art of reducing and drawing up IC boards for radio frequency equipment. Meaning any product resulting from this inherent described and predicted process is all with in the scope ofthe PFN invention and should not be considered unique, therefor falling within the nature and scope claim of this invention.
  • Figure 2 and Figure 2A are first a new drawing detailing the two way paging systems(fig 2) and also 2 A the previous depiction of two way paging and GPS system for personal movement use. They are being shown together in this applications to substantiate the earlier filing ofthe idea and to bring all these personal tracking and PFN devices in to on area for commercial development. Both the old and the new drawings and descriptions will be covered in this pager section.
  • Figure 23b on the left side is a computer either a Laptop or a desk top computer with three numbers on the left side. The numbers are 2301b, 2302b, and 2303b. These show the possible commercialized products that can be provided from a pager locating system. In this pager locating modality a GPS receiver is likewise utilized.
  • 2301 b on the computer is a commercial web site that supports maps and tracking service most probably provided by the paging service.
  • the (two way radio, or wireless telephony) would generate useable earth coordinate data obtained by distance and directional sensing equipment or functions performed by the receiving tower hardware and firmware and send this data to a paging system software via paging system software protocols, which during the process ofthe signal employs an automated triangulation software algorithm based on known receiving towers fixed positions on the earth to provide at least an accurate two dimensional fix of longitude and latitude to be applied to a bit map or calibrated map program to be run as a web page, personal E-mail shared providers cable or Satellite (joint ventures with pager provider) or run on an individual e mail site through the persons Internet provider with/ IP protocols and application specific software (possible joint venture Internet provider and Pager provider)at the application level with all data transparent till the end user inputs user ID code Pin number password
  • the messages would carry NEMA or GPS data in some format from a connectable GPS receiver that is interfaced to a two way pager (processing separate or as part of an integrated circuit), which when activated would allow the service software to pull up the correct calibrated bit map and pace the identified paging unit etc. as an identifiable Icon, number, symbol etc. to the computer viewer, when they entered the correct pin ID upon entering the web site as the correct authorized subscriber to the service.
  • 2302b represents the same process operated by government agencies, for conditional released of convicts or parolees. This application would allow the judicial and law enforcement to monitor restraining orders in real time along with dispatch medical staff and perform interdictor functions if need be. This technology is detailed in Figure 9.
  • victims can be given alert reports and visual updates, by automated Page messaging, Email, and telephone messaging embedded in the software command structure to be entered by the authorities.
  • the Government can defray another program to cut health care cost by providing this service to the economically destitute in need of a watchful eye for the mentally handicap those with dementia, Alzheimer's suffers or the severely physically handicap where expensive nursing service can be either reduced in cost and made better from professional or a family member. More freedom can be given to the health care provider because they can monitor a disabled patient or love one in one location including vital signs while doing other activities near by. Drug firms and Insurance companies could sponsor these web site inexpensively or free with other advertisements running to pick up the cost.
  • 2303b can be a personal e-mail address where the individual has purchased the software to run on their personal equipment making it an intranet at the very least. And of course they would be capable of sharing this tracking with other agreed upon email web sites.
  • Much ofthe technology has been detailed for this in the Radio frequency modality in Figure one, however there is some other modalities possible to achieve this for all three of these configurations and product offerings 2301b, 2302b, 2303b.
  • One ofthe simplest hardware configurations employs a GPS receiver 2306b (Garmin, Delorme Lassen, Rockwell Jupiter etc. or a chip set and antenna Philips, Motorola etc.
  • a processor that is programmed to condition the NEMA signal into a packet of characters for the pager protocol and interface with the two way pager and send the command to the pager device 2305b to transmit the GPS NEMA data packet in pager protocol to the paging service that has the software command to complete the programs described above.
  • This of course is done by using a developer program from the paging service to interface with their protocols.
  • Kline Walker LLC has detailed this out as a commercial undertaking with a number of companies because of geographic dominance in the market place. First contact will be with Motorola's flex and reflex protocol companies in the United States and with RIM pagers in the Canada.
  • Nextel also does short radio messaging in both Canada and the U.S. In Europe and the European Radio Messaging System ERMS Phillips and Erricson etc. . These companies and commercial plans are being stated to increase understanding and cooperation to achieve a working relationship with these manufactures to develop the entire PFN system.
  • 2304b in Figure 23b is another paging device capable of receiving direct two way paging and this device supports an LCD display and firmware for displaying tracking to display another remote location two way pagers location as well as it's own position from it's GPS connection or if a pager system is running triangulation algorithm to provide location from tower distances rather than GPS.
  • a IP-950 pager is employed in case a Trimble Lassen SK8 GPS will be used as the GPS receiver.
  • the serial port will be closed and being charged through the PFN processor running this firmware.
  • the PFN processor will be connected to pin 2 DTR output and pin 4 DSR in put ofthe IP950 pager.
  • the default protocol will be TAIP format. All hardware terminals and contacts as well as software commands and protocols are in Appendix I. Other two way paging products and protocols for locating systems through Motorola products like Page Writer 2000TM, Create a Link IITM, etc., have been detailed in related PFN patent applications 2308b in Figure two is the belt 2309b is the power pack 2310b is the clasp for the belt and 231 lb is the security line and or antenna which is completely detailed in Figure 23E. Figure 23E will detail all the specifics for the personal tracking PFN system and all the hardware connections. The belt bracelet collar or clasp system is in no way the only modality for the personal PFN to be deployed on an individual or and animal.
  • PFNS 1401 is a belt buckle that has a special key to release the locked buckle or electronic lock or any kind of locking mechanism.
  • 1402 is a hard nylon or similar plastic flexible strap resistant to cutting in the most practical way, that has and inner liner of nylon strap so that one or two way pagers and or a G.P.S. system like Motorola "Oncore"XT, XTsII,GT, UT, VP or Philips G.P.S. chip set mentioned earlier in this application can be secure and concealed in an protected enclosure between the two nylon straps to store these G.P.S. components along with differing levels of transmitting devices that can receive signals or messages, transmit signal or messages, and or alert of sound alarms on both sides of these transmissions.
  • This 23b 1 is Figure also 14 from an earlier PCT and U.S. filing for this PFN technology
  • Figure 14 displays varying levels of one way and two way pagers and C.O.T.S. paging protocols as well as voice paging applications.
  • this invention provides for short RF signal transmitters with their transmissions received by every piece of equipment that has a PFN. and will ultimately all have RF transceivers to receive these emergency priority signals and condition the signals and repeat them in a pre programmed manner over what ever long distance communication hardware that exists in the PFN to the proper authorities. This is a repeater function deserving of special consideration and is not the same technology stated hear for the pagers in Figure 14. As has been described and maintained through out all these applications.
  • the G.P.S. chip set or IC board is represented in Figure 23B1 by #1405.
  • 1407 is the patch antenna for the G.P.S. and this cable would be place into the belt and follow the contour ofthe belt to be concealed.
  • 1403 is an extra battery in some equipment variations and a way to give longevity to the entire locator belts functions.
  • 1406 is a speaker or a loud speaker if a monitoring protocol determines it to be the best option to send a message either via a pager or cell phone signal, e.g., Motorola reflex protocol to alert the person wearing the belt, e.g. , criminal leaving a restricted area, or child lost and a public announcement is desired to seek aid from responsible adults in the area.
  • the speaker could also emit a loud electronic whistle or shrill alarm intermittently to attract attention to the wearer ofthe locator belt or band.
  • C.O.T.S. Pager products that will be used in the proto types are the Creatalink pager processor both one way and two way, the standard one way and two way pagers (reflex protocols) using the interface technology detailed in earlier related patents, e.g.,current sensing as was done in the first patent and Binary/ASCII/NMEA BIN/Loran from the G.P.S. all processed into 20 bit data segments to meet the Motorola reflex protocols for transmitting return data. Either through soldered connections, or BNC connector DB9 for RS232 as already detailed. The software for these applications are available for product development for this product through Motorola and only the specific software commands must be written to create the desired functions.
  • 1408 is a voice recording chip to give prerecorded messages as triggered from phone pages as described in the first related application for the stop and control box.
  • 1415 is a processor if the Creatalink is not used and it could be a small stamp computer.
  • a Stamp lor II although Motorola and Philips as well as Siemens Tech, Radio Shack and a host of others all make micro controllers or processors to turn on the voice chip and speaker or hailer when they receive and recognize a coded message from 1404.
  • the water sensor sends a signal (the small square [W ⁇ in 1408 indicates a water sensor which would go off if the wearer of the belt was being submerged in water. And Of course all the electronic equipment is made water proof.
  • FIG. 1404a shows a C.O.T.S. standard one way pager with the inventions proprietary non intrusive battery peg 1409 connected to a current sensor chip exactly the same as the first patent for the stop and control box to sense a silent pager vibration activation.
  • the chip is connected to the voice recorder chip so when a phone page is received it draws current down out ofthe battery peg circuit and creates a ground on one pin ofthe current sensor which triggers the voice recorder or howler or hailer through speaker 1406a message or noise.
  • a small micro controller with a EEPROM can run firmware programs to alert the surrounding public or in a two-way pager reflex protocol application monitor 20 character bit audio sound bite of what the wearer is experiencing.
  • 1402 is a belt on a man walking on earth.
  • 1410 shows 4 satellite a minimum for getting G.P.S. coordinates and most systems mentioned use at least 6 satellites and as much as 8 channels are available for taking a reading in all the Motorola chip sets.
  • 1411 (SG) tower is a commercial server or land line phone node or gateway as has already been thoroughly described.
  • 1411 tower will pick up the page signal or RF signal or Cellular system, if these technologies are employed and convert them through phone modem and transmit that signal down a ISDN phone line or comparable to at least one computer 1412 that is running a G.P.S. program to monitor the Bin/ASCII NMEA earth coordinates and time coordinates data transmitted to 141 1. Also as was described earlier the coordinates could be monitored from the car 1413 if the car was the phone data node or the car was able to network with 1412 to receive down loads for the data of earth coordinates. All easily accomplished as described earlier.
  • the second Figure down in upper left is the belly belt locator belt laid out flat. And 1401 is the lock buckle 1403 extra battery 1404 is the pager 1405 G.P.S.
  • This Figure is the basic cellular tracking system that has always been a part ofthe earlier related patents in uses the PCMCIA Complete Card TM which is 2305C in Figure 23C (RIM also makes a comparable PCMCIA card with a cellular transmitter, a 386 processor for the modem and an antenna)
  • PCMCIA Complete Card TM which is 2305C in Figure 23C
  • RIM also makes a comparable PCMCIA card with a cellular transmitter, a 386 processor for the modem and an antenna
  • the PFN technology has been detailed through out the related patents for anyone skilled in the art to construct each C.O.T.S. component that is used to create the feasibility prototypes. But additionally a crucial component and quality of this PFN technology is to be constructed to be user friendly and produce an accountable electrical interface platform of plug, program and play user friendly forward, present and backward engineering capacity to accommodate a large variety of devices and achieve as universal interface as much as possible.
  • 2307c will have local memory to perform accountability for activity controls communication and the verification of data reported for complete personal PFN functions 2306c is the GPS receiver which in some cases will be connected directly to the RXD and RXT as well DTR RST terminals in the PCMCIA card connector and the proper electrical connection to energize the card to the battery 2308c.
  • GPS receiver which in some cases will be connected directly to the RXD and RXT as well DTR RST terminals in the PCMCIA card connector and the proper electrical connection to energize the card to the battery 2308c.
  • Garmin came out with a a GPS Phone recently that when coupled to an other companies software can track the phones location though polling the GPS phone through call to receiver dial tone response to perform a look up function on fagawi software and maps that are calibrated and will correlate the tones to latitude and longitude which relate to a specific bit on the map.
  • These originate from the Garmin GPS receiver in the Cellular phone and are processed from NEMA data or Binary code ASCII or HEX to the dial tone sounds in a micro processor with this burned in firmware then they are transmitted over the phone where they are recovered with the Fagawi software operating with of course an IP phone connection modem and computer plus monitor.
  • RIM Research In Motion Ltd.
  • RIM is a company in Ontario Canada and the manufacture of wireless communication components that can be utilized as an other modality in constructing this invention the either the personal PFN and or the equipment PFN.
  • RIM Pager-IP Internet Protocol 950 for pager tracking in Figure 2's description they like Nextel have many ofthe communication capabilities to provide either singular communication components or a combined array in the PFN. Plus they have different market concentrations and slightly different product quality offerings in their respective markets.
  • Rim Radio Modems 902M and 80 ID and 802D RIM Radio Modems are operating on 900mhz and 800 mhz and function through basically cellular or radio messaging frequencies and protocols used by the wireless telephony industry companies and their provided IP gateways. This of course is another communication option for the multi-communication array capability of PFNs in general.
  • Kline and Walker LLC will seek to develop this inventions products. That will employ these components through the modalities in this application and the related application in the respective geographic market areas. This would include in Canada Research In Motion LTD, The owners and operators of Mobitex packet- switched narrow band n s t work, which is designed for wide-area wireless data communications. The operators or service providers would include, BellSouth Wireless data in the U.S. Bell Mobility in Canada. Also for the 800MHZ RIM's 801 D and 802D where DataTAC® is the narrow band wide area wireless communication network. Kline and Walker LLC would seek in the commercialization of this PFN invention ARDIS in the U.S. and Bell Mobility in Canada. Others would be sot in other international markets like Asia Australia and Europe as they employ DataTAC® or Mobtex or a compatible packet radio software for these frequencies or one those wireless systems so designated by the governing authorities.
  • the PFN system was created to prepare accurate data for the public and private interests groups to review in real -time so that the most cost effective beneficial decisions based on real data, education, deliberation that result in an all points bottom line reality check presentation can be used in making proficient commercial, environmental and social decisions, regarding investments and projects so that the cost of negative public opinion is reduced, while encouraging private, and public investment and understanding in the process that is presently receiving poor public review.
  • the PFN system will reduce time, money and resource waste on policy that is clearly un-benef ⁇ cial or even corrupt and badly in need of public trust; and conversely help to educate all to support those worthy pursuits that are beneficial and develop a better quality of life, an economic tool to relieve social tension for a peaceful coexistence.
  • the PFN factor can become an accurate economic tool for appraising any financial endeavor or investment made by any Company, Government, Bank, or project, etc., especially the equipment and environmental PFNS detailed in the earlier related filings.
  • the PFN system could be a condition of securing investment funds.
  • This accountable data acquisition tool can aid to provide financial stableness to the investment process including the stock market.
  • the PFN system when used by responsible individuals in a free and fair world the PFN system can be an optimum tool to develop trust, and a quality life as is so greatly needed in this populated earth where population management, environment and resources fairly and efficiently balanced for civilization to be supported in it's physical existence.
  • Shot Message service SMS paging in a PFN when interfaced with the PFN is one modality to provide one and two way paging to any PFN, and as part of a Nextel product offering secure cellular digital phone service and simulated two way direct Radio protocols a most Ideal way to perform accountable remote control and management. These systems are conserving space in the PFN. And with an additional memory function available to the paged messages in Nextel's SMS this could act as a local memory loop required in the PFN for accountability. Of course, the entire phone or this memory function part would have to be contained in a protected area physically and electronically from tampering.
  • the web page control system could utilize Nextel software to send a remote control page to a PFN either personal or to an attached piece of equipment to perform an accountable remote activity and record that command in the system buffer(Mass data Storage System) as well as an local memory supported in the PFN.
  • Nextel software to send a remote control page to a PFN either personal or to an attached piece of equipment to perform an accountable remote activity and record that command in the system buffer(Mass data Storage System) as well as an local memory supported in the PFN.
  • Other software Macros can be written and employed to key stroke commands in these running software programs on web pages to further automate the process, or by knowing the appropriate key code for the software program enter the commands to become an operating component ofthe running communication software program.
  • any ofthe communication systems can be employed to send any NEMA GPS data back to a personal web site so long as the software is appropriate at the application level to place the coordinate data with the right identification data as an object on a calibrated map on a computer screen, monitor or interfaced TV with Video Game Map Program. Or processed by commercial IN server boxes.
  • the PF ⁇ /ES ⁇ signal is ID by the communication device being served (may also carry PF ⁇ /sn) then the communication server sends the data stream to the subscribers cable, satellite, or computer provider or web site or E-Mail address (as directed by an accompanying command communication string that is created by the subscriber at the time of acquiring the service - this is entered into the systems operational software so that the location data (or any other telemetry) becomes available to the account holder or their authorized persons, when accessed by a specific pin number or security code, which will unlock the transparent data or encryption in the final application software (either local or systemic run) for these end users to view location and see any data telemetry from their mobile PF ⁇ asset.
  • PF ⁇ priority system for tracking assets inexpensively for people, pets and their personal objects involving and employing a variety of devices. It applies to both the personal PF ⁇ s and the machine, vehicles and equipment PF ⁇ s. It can be operated as an intranet on limited RF equipment for limited distances or it can be a limited intranet through repeating or digitpeating through other PF ⁇ s as relay stations.
  • IP protocols and proprietary protocols detailed above till the data reaches the subscriber at the application level, where personally owned and operated with a phone modem computer and software.
  • the subscriber can authorize their communication provider to route their personal tracking or PF ⁇ telemetry for any data through an IP gateway to the Internet via commercial private, public(Gov. or ⁇ on Profit gateways) or, the in house communication provider's IP gateway link can be the route for sending the data to a common company owned web site for general viewing.
  • subscribers personal e-mail wear the Internet provider supplies the posting software to convert the signal to display the telemetry data through the correct software and viewing screen architecture for, e.g., tracking (maps), physical telemetry ( graphs heart rate, BP, etc.), multimedia, video, audio etc.) (windows based, etc.).
  • servers sponsoring advertisements can provide this service for a nominal fee, either with individual security (transparent and encrypted, etc. which displays individual views of subscriber assets, or as a mass posting with zoom in clarity on a subscribers particular asset that was made as a personal request to see location (by clicking on) - (all willing responders presently being displayed could be viewed or cleared from the screen by viewer preference).
  • This drawing shows multi communication systems interfaced, which is one major organizational function ofthe PFNS. So the drawing inco ⁇ orates Nextel's present technology and protocols as another Commercial Off The Shelf (C.O.T.S.) Product for multi - tasking communication in the two different categories of PFNS; Personal or Equipment PFNs. It is not a panacia or optimum multi-communications service for the PFN protocol, but it is a step in the correct direction to offer a organized accountable scanning function for dedicated RF, wireless telephony, and paging systems designed for PFN protocols.
  • C.O.T.S. Commercial Off The Shelf
  • FIG. 23 is an earlier patent application Figure detailing the convergence of paging radio and telephony wireless in the PFNS.
  • the top half of the Figure details the use of computers, and or TVs as everyday monitoring systems to operate personal tracking in the least expensive manner and to add product to this technologies base systems and grow sophisticated accountable personal PFN for remote management and control. This is done to provide product to all economic levels and systems that can be built on as one has the capability or need to do so.
  • 23D01 is a home based PC either lap top or desk top model. And 23D02 is a regular house TV. 23D01 is connected to an standard land line phone in 23D13 through an internal computer phone modem and is capable of receiving any telemetry data from a personal PFN GPS tracking along with other data streams though Internet protocols interfaced with varying types of Internet gateways basically Packetized RF, Paging, cellular phones or wireless phones analog or digital systems CMDT and DMDT by operational software products provided by service providers and prepared for Internet protocols (IP).
  • IP Internet protocols
  • 23D12 is a serial RS232 modem that is capable of handling packet identified or binary Data, Hex decimal data ASCII NEMA protocols and or TTL. This 23D12 modem has the option of being connected to 23D09 a radio frequency either short or long distance but most generally local unless operated by a licensed amateur radio person using short wave equipment ect bouncing off the ionosphere around the world.
  • 23D09 short range tracking (Tot Spot) communication can be obtained inexpensively through another modality for the economically compromised (not owning a computer) through the TV and a game style software program caring the calibrated map library the APRS software along with desired zoom functions retrieving the digital data from the 23D12 modem connected to the game control input connector.
  • 23D12 would be connected the same as is done in Figure 23A and the short range RF would be the personal tracking belt would have the same as the protocol and architecture detailed in Figure 23A as well as commercial products consolidated in integrated circuits.
  • the service providers for the two way Pager systems, and wireless phones would use triangulation locating to the known towers and provide the IP hook up through a intranet to area cable providers as a product to sell to cable sub scribers where they would run a software program for the subscribers to view their children on their own home TV or make a request for specific alerts for when their children were past a certain distance from, e.g., the house.
  • the cable providers world run this in a mass data management computer and the base technology of tracking an asset on the screen is the same as Figure 23 A. This would also be a service sold to the satellite companies where they are dominant in the market place.
  • Up-links and requests are possible for Cable Satellite and Web TV to personalize program service even through TV remotes, and phone land line COMMERCIAL NOTE: Kline and Walker in the development for the personal tracking and PFN remote monitoring, management and control claims sole proprietor ship for any variation of this product.
  • Kline & Walker will seek out all the same phone systems and pager system as well as Direct V and Media General Cable etc. and the Internet providers AOL, Erols etc. for the computer area. This is one way to allow parent of all economic strata to afford inexpensive device to track their children and pets on their own TV as well as receive other Data streams from their child's life experience, when they are not able to be with them or want to be in the back ground.
  • the least expensive will be the two way pagers that are tracked through triangulation from the receiving towers and processed by the paging provider and transmitted to the correct TV provider for the pager subscriber for tracking. Still a new technology in the locating system might keep this cost up presently but it will quickly go down with volume. (Of course as detailed this can be done in all the modalities detailed in this application as well as all the related PFN application.
  • the software will be written to allow a parent to switch to their family channel on their TV and poll their programmed ESN PFN family units and watch their real-time activities.
  • the tracking and object placement of a specific PFN will be accomplished by the same method involving calibrated maps and building architecture as previously detailed.
  • Split screen application will advantage those that have to monitor the disabled, while viewing regular programming.
  • 23D06 is the Nextel Radio Phone Pager combination or a radio or a cellular phone 407 is a pager basically two way and 23D08 is a GPS receiver if this is used for locating the personal tracking system or PFN.
  • This a drawing depicting the many attributes of a personal PFN in the form of a belt, collar harness bracelet, bracket or circular securing device. It is not meant as the only modality or the best modality for carrying out the person or animal PFN set of systems. It is merely employed here to display many ofthe functions, configurations and uses of this versatile invention. And primarily all personal tracking with accountability and or remote control and management for such an individual device falls within the nature and scope of this invention.
  • Figure 23 E the belt or collar system is displayed in the closed attached position as viewed from the top as if attached to some one or an animal. And it is also displayed as laid out in a lower view.
  • the belt has a lot of accessories and it should be kept in mind that in many cases not all accessories would be used however the design of all PFN systems is to universalize a base system in which inexpensive plug and play accessories can be added to the system as desired.
  • the belt systems components will be constructed to allow for varying bracelet/ belt/collar/harness sizes to use the same electronics.
  • 23E02 in the top and bottom vie is a video cam system with audio pickup (Digital or analog - size and cost will determine component)
  • 23E03 shows a top view of a finger thaw for an individual to place their index finger, etc. into upon an identity request either self generated locally by the personal PFN processor on the belt or as a remote communication request from an accountable monitor management and remote control system (Gov. Police agency, hospital or monitoring medical staff.
  • the finger thaw can also be used to determine pulse rate.
  • the main PFN processor will be capable of coupling up to a desk top/laptop desk top and have flash memory burned into EPROM's to run different accessories or accommodate change in functions.
  • crucial code keys timed access and pin numbers as well as any number of security measures will be employed to insure only the authorized personnel make any programming alterations. Programming will also be employed to ready the mechanical lock system in 23E10 to open.
  • This system might require one key with a resistor in it much like the GM vehicles or a card swipe like hotel doors with a magnetic strip or the use of a smart card or chip and reader or a signal sent remotely or inputted though a restricted connection port on the personal PFN system. All of the technology to construct these modalities is detailed in earlier related patent applications as preventive means to restrict the unauthorized use and access to equipment PFNS. So these same or similar modalities can be applied by anyone skilled in the art to construct a secure locking mechanism for the mandated belt application.
  • 23E19 is a sensor array which will have a serial RS232 or comparable protocol more probably a USB system connector(at present), nevertheless, all such possibilities are well documented in the prior related PFN applications. It will connect with a unibus cable system running through the belt labeled 23E07. 23E07 will be capable of supporting physical connections in various positions around the belt for accessories and the PFN processor or
  • C.O.T.S. component processor system will be able to drive the components through burned in software programs installed through a computer with the specific commands that are appropriate for an explicit application.
  • the reason that C.O.T.S. processors are mentioned here is because as has been detailed through out the PFN invention for man and machine is the continual consolidation and increased functions of product offerings and the PFN platform is designed to be an accountable organizational interface to perform remote control and management for society. So, it is important to point out that these C.O.T.S. products and integrated circuits of multitasking devices are all with in the nature and scope ofthe PFN invention.
  • Kline and Walker LLC will seek out all these named electronic manufactures and service companies in a cooperative effort to marry up and interface in the most economical fashion and commercially beneficial means for all including the end user, (in other words if there is engineered product that can be obtained through a specific modality preferable to a specific manufacture and their engineering staff that full fills the PFN protocol and any standard for such product application Kline and Walker LLC will cooperate, license and work to enhance and complete these products and systems in as amiable manner as possible for all.
  • the major objective being to organize the PFN system and networks to provide accountable activities and management so badly needed for public safety and the environment, while insuring a good fair and just respect for individual's rights and their privacy.
  • These PFN systems are designed to enable and provide more freedom for life's learning experience, while helping to safe guard public and personal safety through realtime remote management and control when needed.
  • Objective PFN Accountability is the management tool for respect for all.
  • 23E19 is representative block of many possible sensors e.g., water sensor, breathalyzer, body temperature, radiation or hazardous material detector, e.g., the Nose, drug detector, pressure detectors and any measurement transducers that can create a unique electrical signal (Analog, or digital, current sensing, TTL, or digital Binary ASCII Hex decimal or any special data protocol like (NEMA) to provide data to the PFN processor, 513 which is handled by the software and firmware preprogramming for response locally and systemically through reporting these data streams to any remote location.
  • a unique electrical signal Analog, or digital, current sensing, TTL, or digital Binary ASCII Hex decimal or any special data protocol like (NEMA)
  • the digital camera is also detachable and can be held up to the eye to transmit an image ofthe iris ofthe eye to allow for system software presently IBM, Lockheed, or flash 21 digital to confirm identity through secure wireless transmissions timed and reported with GPS location coordinates.
  • system software presently IBM, Lockheed, or flash 21 digital to confirm identity through secure wireless transmissions timed and reported with GPS location coordinates.
  • contact nodes that can press or conduct through fabric or are provided portholes to make contact with the skin either as sha ⁇ s or liquid conductent released at the appropriate time to enable a low current of amps and high voltage to disable the wearer ofthe belt, e.g., a Tazer gun function either by a commercial C.O.T.S. system adapted for this pu ⁇ ose with the trigger mechanism wired to an output function pin ofthe PFN processor and pulled high or activated to dissipate the short high voltage charge to disable the person or animal.
  • this invention would construct this entire system out of a capacitor and relay system with Toshiba driver to operate the relay triggered by the stamp computer or processor (this process already detailed for other applications.
  • the capacitor is energized from the power pack and re energized automatically each time it is fired or dissipated.
  • This is an extreme measure system and would have strict protocols and rapid response teams accompanying this action.
  • the system would be made as impregnable as possible and tamper resistant with alerts accompanying any attempt to deactivate or compromise the system.
  • 23E17 is another extreme Personal PFN control measure. It is an automated medicating device in which a sedating dose of medicine is given remotely or locally by the appropriate authorities with much the same response protocols for it's application.
  • the wearer ofthe belt would be evaluated for tolerance and effectiveness ofthe medication used and their general physical condition.
  • the PFN processing and memory unit is another connection point indicated by a dark round oval.
  • This connector is also a multi-pin connector and would support telemetry leads attached to sensors for a heart rate and a blood pressure transducer cuff around the ankle to retrieve blood pressure.
  • These electronic signal would be sent to a remote attending medical staff and recorded in the accountable memory both locally and remotely with audio video location data and time and date markers.
  • the remote management team would monitor the effectiveness ofthe dose and have a second medication available like adrenelin or steroids to reverse the dose or halt any allergic reaction, while the emergency behavioral response team was in route.
  • 23E06 leachate alcohol sensor is placed in the small ofthe back (lumbar) region and sponge covered to allow perspiration to collect and be sampled for pH and aromatic changes that take place during the consumption of some drugs like alcohol.
  • This sensor another transducer will generate a specific signal back to the Personal PFN computer and resident software program for an appropriate preprogrammed and or remote controlled response or for monitoring and management decisions for the conditionally released as an early warning to a possible at risk situation for the individual and or the public.
  • the communication system in use on board the remote management and control behavioral response team can be there at the critical time to give protection and serve all parties.
  • 515 is a power pack to be determined with a solar cell for recharging. However, the solar cell would be connected to a area ofthe body most likely to be exposed to the sun like the shoulders or head. This is discussed in this application and earlier related applications.
  • 518 is to be a event memory storage for applications that require a larger event storage that is provided in the 513 processor area.
  • These memories storage devices could be flash memory, or Sony Memory SticksTM or any ofthe memory technologies detailed in all the related PFN patent applications. Also they are protected for accountability comparisons with redundant off board memory storage.
  • 509 just below the unibus 507 that connects all the components physically and supplies power to all the components is a large black line. It can be seen in the top closed view as well depicted as one continuous line. For the mandatory wearing of this belt when the buckle lock is closed and sealed this line is a continuous connection through the buckle and impregnated into the PFN computer compartment which is also enclosed in a tamper resistant package with alert systems(local and remote- a topic well covered-because it is the same application specific protection for all essential components as detailed for all PFNs to be of practical service to be accountable systems)
  • 509 caries a special signal generated at one end ofthe line on a out put pin from the 513 processor and received on an input pin on the other end ofthe line and the pins reverse their function from input to output by a running program in the processor that also measures the resistance or current levels to detect if anyone has interrupted it or attempted to jumper any connection.
  • the under harness or wearing apparel will have wiring and sensors that can provide physical telemetry back to a PFN system for processing, recording and reporting to the proper support staff.
  • the system will be able to support automated medicine application systems through secure communication links that require close monitoring while giving real time data as to how the patient is reacting to the prescribed and administered medicinal therapy. Conformation of all orders and telemetry will provide accountability both locally and remotely.
  • These systems can also be used to monitor individuals found to have legal social problems due to substance abuse to help manage and control dangerous human behavioral situations where there is a clear legally acknowledged and confirmed problem recognized by all parties, society and the individual and the use of this system is a condition for increased social freedom with legal and qualified monitoring control and management staff available in real time to all parties at risk. This is not proposed for those found to have uncontrollable violence problems and the use of the system would have to be closely planned regulated and watch dogged by legislators, the justice department and civil liberties. This system could also serve well for the mentally incompetent
  • PFNs as mobile offices and their ability to interface with the machine messaging PFNs to provide diagnostic functions.
  • the main point being that personal locating devices that report their location to an other location and different forms of personal PFNs that perform accountable remote management and control are all with in the nature and scope ofthe PFN invention no matter the configuration.
  • Another application involves Cellular telephone communication.
  • This system can employ the same collars belts and bracelets but they will transmit the location data via the cellular phone system. In some incidences these will be closed systems and in other cases they will be open to public access. Cost will be defrayed by commercial advertising supporting the network tracking software and providing security software protocols for the general public to use the two way paging system will also employ the same kind of belts and bracelets — and utilize 2way paging to communicate packets of GPS NEMA protocol data to specific Email address where subscribers or commercial advertisers operate a web site with the soft ware to provide secure individual tracking for a commercial operation.
  • TRAC Trusted Remote Activity Controller
  • FACT Federal Access Control Technology
  • FIG. 24 This Figure is a product list and a check list of suggested modes to carry out any particular product offering.
  • TOT SPOT is a tracking device to a send a child's geographic position to a computer screen organizers palm tops (with wired and wireless modems) or a TV using any of the modalities detailed in the PFN technology through out this application and the related filings
  • HUNT WELL is a location system that provides map placement on a hand held wireless LCD communicator screen of no shoot trail markers, e.g.,(locations of other hunters wearing or carrying location equipment and supporting a beacon, houses or farms, supporting a trail marker beacon that appear on the screen, before shooting.
  • This system and the complete product construction may use any ofthe modalities in the PFN technology to provide many different qualities and properties to this product.
  • beacon PFNS or locating transmitting devices FCC and Tobacco and Fire arms should set special Frequency for this application and PFN beacon transmitters should be supplied to schools, public gathering places etc. roads and known populated areas by the fish and game people in all the states.
  • FCC and Tobacco and Fire arms should set special Frequency for this application and PFN beacon transmitters should be supplied to schools, public gathering places etc. roads and known populated areas by the fish and game people in all the states
  • These systems could uses solar cells and wind generators to provide powered where land lines or batteries will not be a total solution
  • PET POINTER - Of course can be used with other animals (application specific attachments to the animal a consideration of course) But is basically a way to track pets on a computer or TV screen or palm top or GPS or Cellular Phone or pager system if they support a display and a map program any are capable of receiving another's device location transmission signal, through any ofthe modalities detailed in the PFN technology and these devices are all considered to fall with in the nature and scope ofthe invention (personal PFN and tracking devices)
  • FRIEND FINDER or FAMILY FINDER or PEOPLE LOCATOR are all Personal tracking devices to track people through any ofthe technologies many variations detailed for the PFN systems. They may be belt systems, purses, brief cases, concealed in personal valuables that normally accompany the person. These name are being applied to locating system for this pu ⁇ ose. Other names like
  • LOST AND FINDER or BREAD CRUM BOX or CRIME TRAIL BOX or THEIF CATCHER KIT are reserved for personal possessions that are placed in to a lockable container that will give it's location remotely once stolen either activated automatically or by the owner or the police.
  • the systems used here can also be any ofthe PFN modalities to be determined by practicality. It might just as well be a secluded apparatus that is hidden in a valuable or camouflaged. ( These systems can be outfitted with accountable recording equipment all part of this technology's PFN systems TRAC A CON.
  • this system can use the any of the technologies detailed in the PF ⁇ technologies but is a operated in conjunction with law enforcement and has a protocol involving medical expertise, behavior expertise and law enforcement expertise as well as educators and counseling for the public and the parolee or conditionally released.
  • RF systems used for this pu ⁇ ose might well include companies like Lojack and there RF systems.
  • SKI SEARCHER OR (SKI SEEKER) OR HITCH HIKER OR CAMP TRACKER may also use any ofthe modalities in these PF ⁇ applications and it basically is a way to track skiers on the slopes or cross country and for them to call for help from the ski patrol operators ofthe ski lodge or the authorities. Can be a limited range and a system operated by the lodge or tracked by the lodge's monitoring system and personally owned transmitting systems
  • Ski patrol location system monitors all incoming sources and places ESN objects on the map as skiers. ( software program monitoring all modalities of transmission can be used for other applications as well) converged is accomplished by a multitasking communication operating software program in the monitoring computer at the, e.g., lodge or ski patrol headquarters and using the computers Com Ports for RF and IP phone connections for pager and phone or even monitoring through a TV cable or Satellite provider.
  • SWIM SEARCHER OR SWIM SEEKER is a tracking system that is water proof - All PFNs are to be in protective containment but this application is of course made water proof, also the power section has a solar cell so that when the swimmer has to float the solar cell can be exposed to the sun to recharge the power source. These systems are made water dynamic or stream line and can use any ofthe modalities.
  • PASSENGER POINTER or BOAT BUDDY will be placed in seat cushions life preservers or given to passengers onboard boats, buses, subways, trams, trains and planes to be attached to their person as a beacon to rescuers in the event of a mishap in travel.
  • the system is normally inactive and can be activated automatically or by rescuers or the individual carrier — (protocols to determine best procedures FAA NTSB DOT) (FAA is not going to want transmission in flight.
  • PATIENT PAL or HEALTH WATCH this system and accessory arrays track physical location time and date of application specific commands provides an interface platform of monitoring equipment, for remote telemetry and activity controls for medication actuators aggressive remote control, while providing Accountability systems including audio and video, etc. as well as a record of command received prescribed therapy in two locations at least. Also a special automated 91 1 message can be individually programmed by medical experts or real-time voice communication can take place for the mentally lucid. All the systems are augment incrementally for patient condition and accessories are prescribed as needed.
  • This drawing is a Figure showing land platforms sea platforms and rail platforms and a basic way to slow stop and secure these pieces of equipment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Selective Calling Equipment (AREA)

Abstract

L'invention concerne un logiciel programmable, modulaire et utilisable appelé TRAC (fig. 1) généralement utilisé dans un noeud focal primaire (PNF) qui autorise et authentifie les commandes reçues d'un téléphone à ligne terrestre ou radio et la radiomessagerie ou les systèmes de fréquence radioélectriques ou les technologies de transmission de lumière pour activer à distance, des commandes et des fonctions automatisées et confirmées par le biais de processeurs ou de dispositifs de commande et/ou des ordinateurs (402) et pour créer des enregistrements pouvant être utilisés localement et/ou à distance (fig. 4). TRAC traite ces données de façon sécurisée. TRAC stocke dans un dispositif à mémoire (406) protégé incorporé dans un équipement et envoie l'information à un emplacement de mémoire local ou éloigné.
PCT/US2000/016381 1999-06-15 2000-06-15 Logiciel trac programmable, modulaire, utilisable et securise WO2000078057A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU57384/00A AU5738400A (en) 1999-06-15 2000-06-15 Secure, accountable, modular and programmable software trac

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US13975999P 1999-06-15 1999-06-15
US60/139,759 1999-06-15
US17681800P 2000-01-19 2000-01-19
US60/176,818 2000-01-19
US20087200P 2000-05-01 2000-05-01
US60/200,872 2000-05-01

Publications (2)

Publication Number Publication Date
WO2000078057A1 true WO2000078057A1 (fr) 2000-12-21
WO2000078057A9 WO2000078057A9 (fr) 2002-07-11

Family

ID=27385392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/016381 WO2000078057A1 (fr) 1999-06-15 2000-06-15 Logiciel trac programmable, modulaire, utilisable et securise

Country Status (1)

Country Link
WO (1) WO2000078057A1 (fr)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1303103A1 (fr) * 2001-10-12 2003-04-16 Alstom Système pour fournir via Internet des informations rélatives à un réseau de transport collectif
GB2387622A (en) * 2002-04-09 2003-10-22 Roy Sherlock Anti-theft control device
GB2387875A (en) * 2002-04-25 2003-10-29 David Martin Keene Vehicle immobiliser system
WO2004015649A1 (fr) * 2002-08-05 2004-02-19 GONZALEZ ORRUÑO, Diego Dispositif de commande pour vehicules a moteur
WO2005015506A1 (fr) * 2003-08-06 2005-02-17 Delgado Acarreta Raul Systeme de stockage, de presentation et de transmission de donnees de fonctionnement d'un vehicule
US7060030B2 (en) 2002-01-08 2006-06-13 Cardiac Pacemakers, Inc. Two-hop telemetry interface for medical device
US8014768B2 (en) 2003-04-30 2011-09-06 Disney Enterprises, Inc. Mobile phone multimedia controller
US8248237B2 (en) 2008-04-02 2012-08-21 Yougetitback Limited System for mitigating the unauthorized use of a device
US8719909B2 (en) 2008-04-01 2014-05-06 Yougetitback Limited System for monitoring the unauthorized use of a device
US8932368B2 (en) 2008-04-01 2015-01-13 Yougetitback Limited Method for monitoring the unauthorized use of a device
US9031536B2 (en) 2008-04-02 2015-05-12 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9576157B2 (en) 2008-04-02 2017-02-21 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9674651B2 (en) 2008-08-12 2017-06-06 Apogee Technology Consultants, Llc Portable computing device with data encryption and destruction
WO2017105913A1 (fr) * 2015-12-17 2017-06-22 Continental Automotive Systems, Inc. Système d'alerte de vol utilisant une caméra
US9838877B2 (en) 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US9881152B2 (en) 2008-04-01 2018-01-30 Yougetitback Limited System for monitoring the unauthorized use of a device
US9886599B2 (en) 2008-04-02 2018-02-06 Yougetitback Limited Display of information through auxiliary user interface
US9916481B2 (en) 2008-04-02 2018-03-13 Yougetitback Limited Systems and methods for mitigating the unauthorized use of a device
CN108351760A (zh) * 2015-08-24 2018-07-31 艾拉物联公司 馈送服务引擎
CN108449573A (zh) * 2018-03-11 2018-08-24 何秀娟 一种金融业务移动智能平台及其使用方法
CN109188975A (zh) * 2018-09-12 2019-01-11 广东瑞德智能科技股份有限公司 光耦隔离驱动电路及电器
US10655610B2 (en) 2017-04-28 2020-05-19 General Electric Company Wire races for wind turbine bearings
DE102019122248A1 (de) * 2019-08-19 2021-02-25 Zf Active Safety Gmbh Fahrzeugassistenzsystem, Fahrzeug und Alarmanlagensystem
US11258830B2 (en) * 2020-06-10 2022-02-22 Charter Communications Operating, Llc Method and framework for internet of things network security

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113427A (en) * 1987-03-31 1992-05-12 Honda Giken Kogyo Kabushiki Kaisha Radio-signal-responsive vehicle device control system
US5223844A (en) * 1992-04-17 1993-06-29 Auto-Trac, Inc. Vehicle tracking and security system
US5479157A (en) * 1990-01-19 1995-12-26 Prince Corporation Remote vehicle programming system
US5499182A (en) * 1994-12-07 1996-03-12 Ousborne; Jeffrey Vehicle driver performance monitoring system
US5508688A (en) * 1991-02-19 1996-04-16 Nec Corporation Selective pager receiver

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5113427A (en) * 1987-03-31 1992-05-12 Honda Giken Kogyo Kabushiki Kaisha Radio-signal-responsive vehicle device control system
US5479157A (en) * 1990-01-19 1995-12-26 Prince Corporation Remote vehicle programming system
US5508688A (en) * 1991-02-19 1996-04-16 Nec Corporation Selective pager receiver
US5223844A (en) * 1992-04-17 1993-06-29 Auto-Trac, Inc. Vehicle tracking and security system
US5223844B1 (en) * 1992-04-17 2000-01-25 Auto Trac Inc Vehicle tracking and security system
US5499182A (en) * 1994-12-07 1996-03-12 Ousborne; Jeffrey Vehicle driver performance monitoring system

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2831008A1 (fr) * 2001-10-12 2003-04-18 Alstom Systeme pour fournir via internet des informations relatives a un reseau de transport collectif
EP1303103A1 (fr) * 2001-10-12 2003-04-16 Alstom Système pour fournir via Internet des informations rélatives à un réseau de transport collectif
US7060030B2 (en) 2002-01-08 2006-06-13 Cardiac Pacemakers, Inc. Two-hop telemetry interface for medical device
GB2387622A (en) * 2002-04-09 2003-10-22 Roy Sherlock Anti-theft control device
GB2387875A (en) * 2002-04-25 2003-10-29 David Martin Keene Vehicle immobiliser system
GB2387875B (en) * 2002-04-25 2005-09-28 David Martin Keene Vehicle immobiliser system
ES2208095A1 (es) * 2002-08-05 2004-06-01 Juan Antonio Gomez Mena Mando y control para vehiculos de motor.
ES2208095B1 (es) * 2002-08-05 2005-09-01 Juan Antonio Gomez Mena Mando y control para vehiculos de motor.
WO2004015649A1 (fr) * 2002-08-05 2004-02-19 GONZALEZ ORRUÑO, Diego Dispositif de commande pour vehicules a moteur
US8014768B2 (en) 2003-04-30 2011-09-06 Disney Enterprises, Inc. Mobile phone multimedia controller
US8892087B2 (en) 2003-04-30 2014-11-18 Disney Enterprises, Inc. Cell phone multimedia controller
WO2005015506A1 (fr) * 2003-08-06 2005-02-17 Delgado Acarreta Raul Systeme de stockage, de presentation et de transmission de donnees de fonctionnement d'un vehicule
US9881152B2 (en) 2008-04-01 2018-01-30 Yougetitback Limited System for monitoring the unauthorized use of a device
US8719909B2 (en) 2008-04-01 2014-05-06 Yougetitback Limited System for monitoring the unauthorized use of a device
US8932368B2 (en) 2008-04-01 2015-01-13 Yougetitback Limited Method for monitoring the unauthorized use of a device
US9576157B2 (en) 2008-04-02 2017-02-21 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9031536B2 (en) 2008-04-02 2015-05-12 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9838877B2 (en) 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US8248237B2 (en) 2008-04-02 2012-08-21 Yougetitback Limited System for mitigating the unauthorized use of a device
US9886599B2 (en) 2008-04-02 2018-02-06 Yougetitback Limited Display of information through auxiliary user interface
US9916481B2 (en) 2008-04-02 2018-03-13 Yougetitback Limited Systems and methods for mitigating the unauthorized use of a device
US9674651B2 (en) 2008-08-12 2017-06-06 Apogee Technology Consultants, Llc Portable computing device with data encryption and destruction
US9679154B2 (en) 2008-08-12 2017-06-13 Apogee Technology Consultants, Llc Tracking location of portable computing device
US9686640B2 (en) 2008-08-12 2017-06-20 Apogee Technology Consultants, Llc Telemetric tracking of a portable computing device
US9699604B2 (en) 2008-08-12 2017-07-04 Apogee Technology Consultants, Llc Telemetric tracking of a portable computing device
CN108351760A (zh) * 2015-08-24 2018-07-31 艾拉物联公司 馈送服务引擎
WO2017105913A1 (fr) * 2015-12-17 2017-06-22 Continental Automotive Systems, Inc. Système d'alerte de vol utilisant une caméra
US10655610B2 (en) 2017-04-28 2020-05-19 General Electric Company Wire races for wind turbine bearings
CN108449573A (zh) * 2018-03-11 2018-08-24 何秀娟 一种金融业务移动智能平台及其使用方法
CN109188975A (zh) * 2018-09-12 2019-01-11 广东瑞德智能科技股份有限公司 光耦隔离驱动电路及电器
DE102019122248A1 (de) * 2019-08-19 2021-02-25 Zf Active Safety Gmbh Fahrzeugassistenzsystem, Fahrzeug und Alarmanlagensystem
US11258830B2 (en) * 2020-06-10 2022-02-22 Charter Communications Operating, Llc Method and framework for internet of things network security

Also Published As

Publication number Publication date
WO2000078057A9 (fr) 2002-07-11

Similar Documents

Publication Publication Date Title
WO2000078057A1 (fr) Logiciel trac programmable, modulaire, utilisable et securise
US20060206246A1 (en) Second national / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20060026017A1 (en) National / international management and security system for responsible global resourcing through technical management to brige cultural and economic desparity
US20030221118A1 (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
US20060287783A1 (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
WO2000051360A1 (fr) Equipement de suivi et de surveillance pour applications de securite
US20070079012A1 (en) Universal electronic payment system: to include "PS1 & PFN Connect TM", and the same technology to provide wireless interoperability for first responder communications in a national security program
US6647328B2 (en) Electrically controlled automated devices to control equipment and machinery with remote control and accountability worldwide
CA2397911C (fr) Interface protegee responsabilisee sous forme de noeud focal primaire
JP2007529797A (ja) 認証機能および支払い機能を備えた、無線自転車キー、自動車、家屋、rfidタグのための携帯電話におけるオールインワンキーまたは制御ソフトウェアカード
Cropf E-government for public managers: Administering the virtual public sphere
CA2318139A1 (fr) Systeme de comptabilite automatise qui evalue, verifie, enregistre et facture les utilisations de materiel et/ou de vehicules pour une societe
WO2001084274A2 (fr) Systemes pfn mobiles pour la gestion a distance de suivi responsable et pour des scenarios de commande dynamique avec ou sans pfn pour vehicules et equipements
Gregg Autonomous Police Vehicles: The Impact on Law Enforcement
TW548563B (en) Automated accounting system that values, controls, records and bills the uses of equipment/vehicles for society
Denef et al. ICT trends in European policing
Rajamäki Studies of satellite-based tracking systems for improving law enforcement: comprising investigation data, digital evidence and monitoring of legality
Myers III A behavioral research model for small unmanned aircraft systems for data gathering operations
Donath et al. Homeland security and the trucking industry
Lyons Autonomous vehicles: a policy roadmap for law enforcement
Chong Vehicle undercarriage scanning system
Williams Reliance on Technology and the Increased Cybersecurity Vulnerabilities It Poses to Our Transportation Industry
Whitehead School Bus Security: A Case for Regulations to Improve Child Safety
Leidel Travel Security Handbook
Johansmeyer Securing public safety vehicles: reducing vulnerabilities by leveraging smart technology and design strategies

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10018095

Country of ref document: US

AK Designated states

Kind code of ref document: C2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: C2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

COP Corrected version of pamphlet

Free format text: PAGES 2/64, 4/64-49/64 AND 51/64-64/64, DRAWINGS, REPLACED BY NEW PAGES 2/64, 4/64-49/64 AND 51/64-64/64; DUE TO LATE TRANSMITTAL BY THE RECEIVING OFFICE

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP