EP1908034A1 - Portable handheld security device - Google Patents

Portable handheld security device

Info

Publication number
EP1908034A1
EP1908034A1 EP05802879A EP05802879A EP1908034A1 EP 1908034 A1 EP1908034 A1 EP 1908034A1 EP 05802879 A EP05802879 A EP 05802879A EP 05802879 A EP05802879 A EP 05802879A EP 1908034 A1 EP1908034 A1 EP 1908034A1
Authority
EP
European Patent Office
Prior art keywords
security device
security
portable handheld
display screen
transmitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05802879A
Other languages
German (de)
French (fr)
Inventor
Inc. Catcher
Ira Tabankin
John Sutton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of EP1908034A1 publication Critical patent/EP1908034A1/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/02Systems using reflection of radio waves, e.g. primary radar systems; Analogous systems
    • G01S13/0209Systems with very large relative bandwidth, i.e. larger than 10 %, e.g. baseband, pulse, carrier-free, ultrawideband
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S13/00Systems using the reflection or reradiation of radio waves, e.g. radar systems; Analogous systems using reflection or reradiation of waves whose nature or wavelength is irrelevant or unspecified
    • G01S13/88Radar or analogous systems specially adapted for specific applications
    • G01S13/885Radar or analogous systems specially adapted for specific applications for ground probing

Definitions

  • the present invention relates generally to security systems and more particularly,
  • Border Patrol officials attempt to screen incoming cargo containers for items that may pose a national security risk.
  • the present invention relates to improvements over the security systems and
  • the present invention provides a portable handheld security device.
  • the security device preferably comprises a central processing unit in communication with a memory
  • a storage device a video display screen, at least one camera, a transmitting device, a
  • receiving device an input device, a power supply, and, preferably, a device for generating
  • ultra wide band ground penetrating radar for locating hidden objects, such as objects of
  • the transmitting device and the receiving device are ideally ideally
  • the input device has a first set of user-interface controls and a second set of user-
  • the security device further ideally includes a security lock out system, digital full
  • mapping system a mapping system
  • two digital cameras at least one of which includes the
  • the security device of the present invention provides a capability for capturing images in infrared light.
  • invention can be used for, among other things, locating dense objects in luggage bags,
  • the present invention further contemplates a method for preventing
  • FIG. 1 is a block diagram illustrating a preferred embodiment of the apparatus of
  • FIG. 2a is a front view of a preferred embodiment of the apparatus of the present
  • FIG. 2b is a front view of a preferred embodiment of the apparatus of the present
  • the portable handheld security device 10 of the present invention is a portable handheld security device 10 of the present invention.
  • central processing unit 12 that is ideally a mobile processing unit
  • the security device 10 also includes a processor
  • memory storage device 14 ideally includes at least 512 megabytes (MB) and 20-30 GB of
  • the security device 10 also includes a power supply 36
  • each side handle preferably comprised of two battery packs in each side handle, for powering the security
  • the battery packs are ideally rechargeable batteries
  • the battery packs can also preferably be "hot swapped" without shutting the device down.
  • the security device 10 further includes an input device 16.
  • the input device 16 ideally includes user-interface controls and touch screen technology for manipulating the
  • interface controls of the input device 16 are preferably auto-ambidextrous in that there are
  • the first set of user- interface controls as shown in FIGS. 2a and 2b.
  • the first set of user-interconnect controls as shown in FIGS. 2a and 2b.
  • interface controls 22 and the second set of user-interface controls 24 are selectively
  • the security device 10 can sense which set of user-interface controls 22, 24 has first been
  • the security device 10 allows both sets of controls 22, 24 to
  • the security device 10 also includes a video display screen 18 in communication
  • the video display screen is ideally a 6.4" LCD screen
  • Touch screen technology or a touch screen display, allows a user to simply touch the video display screen 18 to input information or otherwise manipulate the security device 10.
  • the video display screen 18 also preferably
  • video display screen 18 to input information. For example, a user could draw a circle around an image displayed on the video display screen 18, and save the image, including
  • Picture-in-picture display is preferably
  • the video display screen 18 is also ideally
  • At least one camera 38 is also provided in communication with the central
  • the security device 10 has two digital cameras 38 and can capture both still images and Ml-
  • the full-motion video images ideally are captured at a rate of 30
  • At least one of the cameras 38 ideally can operate in infrared light
  • in normal, low and infrared light can either be mixed within the same full-motion video image, or the user can switch between the normal, low and infrared light modes as an
  • Each camera ideally has a minimum of 2 mega pixels
  • the video capability of the present invention preferably also includes at least a
  • MPEG Motion Picture Experts Group
  • the security device 10 also includes a transmitting device 26 and a receiving
  • the transmitting and receiving devices 26, 28 can ideally securely transmit and receive information using
  • wireless devices 30 such as radio frequency (RF) wireless network cards, or wired
  • WLANs can be used with the security device 10, including without limitation
  • GSM General Packet Radio Service
  • 3G Ultra wide band
  • BluetoothTM and Wi-Fi
  • the security device 10 also ideally supports 400/900 MHz and 5.8 GHz
  • the security device 10 using wireless devices 30, is ideally capable of selecting between available communication
  • the security device 10 ideally has middleware that
  • the security device 10 can also operate whether or not the transmitting and
  • the security device 10 can also be enabled, hi other words, the security device 10 can also be enabled, hi other words, the security device 10 can also be enabled, hi other words, the security device 10 can also be enabled, hi other words, the security device 10 can also
  • security device 10 continues to look for wireless or wired networks with which it can
  • the security device 10 will preferably exchange
  • the security device 10 further includes a device for producing ultra wide band
  • the security device 10 uses an ultra wide band ground
  • penetrating radar unit that has been modified to work in a lower power smaller scale
  • Ground penetrating radar is also commonly used to examine the internal configuration of concrete structures
  • the present invention is intended to be used for locating and identifying hidden objects
  • band ground penetrating radar unit 34 could be used to non-destructively examine the
  • the millimeter wave radar can be used to measure the contents of a piece of luggage at an airport.
  • the millimeter wave radar can be used to measure the contents of a piece of luggage at an airport.
  • RF sources such as the global positioning system 44 and the transmitting and receiving devices 26,
  • Audio capability including a sound producing device
  • a sound recording device 42 such as a digital sound recorder
  • a global positioning system 44 including a microphone, is preferably included.
  • a global positioning system 44 including a microphone, is preferably included.
  • mapping system 46 a biometric scanner 48 including a National Institute of Standards
  • RFID RFID interrogator and reader 50
  • BluetoothTM RF link for headsets and printers 51
  • bar code reading capability 52 two universal serial bus (USB) ports 53
  • USB universal serial bus
  • a software authentication system 54 are also preferably provided in the security device 10.
  • the security device 10 is preferably a complete personal computer (PC) that
  • security device 10 of the present invention can be configured to run on
  • any operating system including Linux, MacOS, Solaris and Unix.
  • the entire security device 10 is
  • the handheld, lightweight, wireless security device 10 can easily be carried and operated using one or both hands, as shown in FIG. 2b.
  • the security device 10 can be easily
  • the security device of the present invention can be used in a number of ways and
  • a method for identifying objects of interest in closed containers such as but not limited to luggage bags at airports or cargo
  • invention is a method for addressing a security breach, such as but not limited to a
  • Example 1 Identifying Objects of Interest in Closed Containers. The ability to
  • Example II Locating Hidden Life Forms. Locating hidden life forms can also be
  • the user can scan an area in which a suspect may be hiding and
  • the infrared camera image of the corner area would show a heat
  • Example HI Addressing a Security Breach. Being able to adequately address a
  • the picture from the security camera could be sent from the security command and control center to the security devices carried by all security personnel.
  • all security personnel would be able to see an actual picture of
  • the security camera could also be sent directly to the security devices carried by all
  • the security personnel could take a photograph using the security device and send the
  • the security personnel could also ask the individual to provide
  • the present invention further contemplates a method for preventing compromise
  • the device is an important function of the device because it helps ensure that the device can
  • the security personnel at a secured venue would provide an authorized individual with a
  • time limit for logging into or authenticating with the security device. If the time limit
  • security device ideally turns black and an innocuous message such as, "please standby"
  • the microphone, sound recording device, cameras, and global positioning system or other location sensor are ideally activated so that the security command and
  • control center can locate the security device, as well as see and hear everything the
  • security device records so that if the device is taken by a person with nefarious intent

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

The present invention provides a portable handheld security device. The security device comprises a central processing unit in communication with a memory storage device, a video display screen, at least one camera, a transmitting device, a receiving device, an input device, and a power supply. The security device further comprises a device for generating ultra wide band ground penetrating radar and/or millimeter wave radar for identifying objects of interest in closed containers. In addition, the transmitting device and the receiving device are ideally capable of selecting between available communication network signals, determining which network signal is the best signal at a given time, and automatically switching between the available signals to maintain optimum reception and transmission quality. The input device has a first set of user-interface controls and a second set of user-interface controls, wherein the sets are selectively operable by users either independently or simultaneously.

Description

PORTABLE HANDHELD SECURITY DEVICE
BACKGROUND OF THE INVENTION
The present invention relates generally to security systems and more particularly,
to methods and devices for carrying out security operations.
In today's world, there are many venues in which safety and security are key
concerns. Airports are a prime example. Security systems currently in use in airports
include passenger and luggage screening at security check points to ensure that
individuals or items posing a security risk are unable to board or otherwise compromise
an airplane. Security is also a key concern at U.S. borders, where U.S. Customs and
Border Patrol officials attempt to screen incoming cargo containers for items that may pose a national security risk.
Current airport security systems typically require large, stationary equipment to
scan luggage and passengers for items posing a security risk. This process is time consuming, and does not afford much flexibility. Moreover, when a luggage bag is
abandoned (forgotten or deliberately left behind) in the airport, there is currently no good
method for airport security personnel to gather any information about the contents of the
bag without opening the bag and physically inspecting its contents. Thus, airport
personnel must often call for back up help or a bomb squad to handle the abandoned bag
or move the bag to another location for x-ray and controlled physical inspection. Another
problem is presented when an individual manages to pass through a security check point
without being scanned or checked for identification. It is currently very difficult to locate
the individual using existing security devices and systems because security personnel on 06
the floor searching for the individual are often relying on a verbal description, which can
be inaccurate, too broad or too narrow. If the individual is not apprehended, under
current guidelines the airport must close the terminal and suspend flights until a physical
search of the terminal has been completed.
Thus, there exists a need for more complete security systems and devices used therein. The present invention relates to improvements over the security systems and
devices described above, and to solutions to the problems raised or not solved thereby.
SUMMARY OF THE INVENTION
The present invention provides a portable handheld security device. The security device preferably comprises a central processing unit in communication with a memory
storage device, a video display screen, at least one camera, a transmitting device, a
receiving device, an input device, a power supply, and, preferably, a device for generating
ultra wide band ground penetrating radar for locating hidden objects, such as objects of
interest in closed containers, and displaying images of the hidden objects on the video
display screen. In addition, the transmitting device and the receiving device are ideally
capable of selecting between available communication network signals, determining
which network signal is the best signal at a given time, and automatically switching
between the available signals to maintain optimum reception and transmission quality.
Further, the input device has a first set of user-interface controls and a second set of user-
interface controls, wherein the first and second sets of user-interface controls are
selectively operable by users either independently or simultaneously. The security device further ideally includes a security lock out system, digital full
motion video and still-screen image capture, recording, and processing capability, a sound
producing device, a sound recording device, a biometric scanner, bar code reading
capability, a radio frequency identification reader and interrogator, a global positioning
system, a mapping system, and two digital cameras, at least one of which includes the
capability for capturing images in infrared light. The security device of the present
invention can be used for, among other things, locating dense objects in luggage bags,
identifying objects of interest in closed containers, locating hidden life forms, and
addressing a security breach. Methods for using the portable handheld security device of
the present invention for the aforementioned purposes are also contemplated by the
present invention. The present invention further contemplates a method for preventing
compromise of a portable handheld security device.
Various other features, objects, and advantages of the present invention will be
made apparent to those skilled in the art from the following detailed description and
accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram illustrating a preferred embodiment of the apparatus of
the present invention.
FIG. 2a is a front view of a preferred embodiment of the apparatus of the present
invention.
FIG. 2b is a front view of a preferred embodiment of the apparatus of the present
invention showing the portability and handheld features of the present invention in use. DETAILED DESCRIPTION OF THE INVENTION
Referring now to the drawings, the portable handheld security device 10 of the
present invention has a central processing unit 12 that is ideally a mobile processing unit
such as an Intel Pentium® mobile processor. The security device 10 also includes a
memory storage device 14 in communication with the central processing unit 12. The
memory storage device 14 ideally includes at least 512 megabytes (MB) and 20-30 GB of
hard drive space as shown. The security device 10 also includes a power supply 36
preferably comprised of two battery packs in each side handle, for powering the security
device 10 and all of its components. The battery packs are ideally rechargeable batteries
that can each provide sufficient power to keep the device 10 operational for several hours
at a time on a single charge. The battery packs can also preferably be "hot swapped" without shutting the device down.
The security device 10 further includes an input device 16. The input device 16 ideally includes user-interface controls and touch screen technology for manipulating the
security device 10 and inputting information into the security device 10. The user-
interface controls of the input device 16 are preferably auto-ambidextrous in that there are
two sets of user- interface controls, as shown in FIGS. 2a and 2b. The first set of user-
interface controls 22 and the second set of user-interface controls 24 are selectively
operable by users either independently or simultaneously. In other words, the user can
select a single set of user- interface controls 22, 24, to accommodate left or right-handed
tendencies, and use that set of user- interface controls exclusively and independently of
the other set of user-interface controls, or the user can select both sets of user-interface
controls 22, 24, if the user is ambidextrous, and use both sets simultaneously. Preferably, the security device 10 can sense which set of user-interface controls 22, 24 has first been
touched by a user and make that set of user-interface controls the primary set of user-
interface controls, thereby allowing the user, consciously or unconsciously, to select a
single set of controls to operate independently based on his or her left or right-handed
tendencies. If both sets of controls are touched by a user within a predetermined time
period such as 2 seconds, the security device 10 allows both sets of controls 22, 24 to
operate simultaneously so that a user can use either hand in the middle of an input or
manipulation.
The security device 10 also includes a video display screen 18 in communication
with the central processing unit 12. The video display screen is ideally a 6.4" LCD screen
that supports touch screen technology. Touch screen technology, or a touch screen display, allows a user to simply touch the video display screen 18 to input information or otherwise manipulate the security device 10. The video display screen 18 also preferably
supports direct freehand drawing input, allowing a user to write or draw directly on the
video display screen 18 to input information. For example, a user could draw a circle around an image displayed on the video display screen 18, and save the image, including
the circle, for later use or distribution to others. Picture-in-picture display is preferably
also supported by the video display screen. The video display screen 18 is also ideally
readable in any lighting condition, including sunlight, to facilitate both indoor and
outdoor use.
At least one camera 38 is also provided in communication with the central
processing unit 12 for providing video capability for the security device 10. Ideally, the security device 10 has two digital cameras 38 and can capture both still images and Ml-
motion video images. The full-motion video images ideally are captured at a rate of 30
frames per second, and play back at 1-90 frames per second. Panning, zooming, fast
forward, reverse, normal play, and pause features are also preferably supported by the
security device 10. At least one of the cameras 38 ideally can operate in infrared light,
and at least one of the cameras can ideally operate in normal and low light. Pictures taken
in normal, low and infrared light can either be mixed within the same full-motion video image, or the user can switch between the normal, low and infrared light modes as an
image is being captured. Each camera ideally has a minimum of 2 mega pixels
resolution, and up to 8 hours of full-motion video can ideally be stored in the security
device 10. The video capability of the present invention preferably also includes at least a
Motion Picture Experts Group (MPEG) encoder and decoder 58, 60.
The security device 10 also includes a transmitting device 26 and a receiving
device 28 in communication with the central processing unit 12. The transmitting and receiving devices 26, 28 can ideally securely transmit and receive information using
wireless devices 30, such as radio frequency (RF) wireless network cards, or wired
devices 32, such as ethernet cable connections. Many different wireless local area
networks (WLANs) can be used with the security device 10, including without limitation
802.1 la/b/g, 802.11 "super g," 802.15.3a, Global System for Mobile Communications
and General Packet Radio Service (GSM/GPRS), 3G, ultra wide band, Bluetooth™, and
CDMA One. The security device 10 also ideally supports 400/900 MHz and 5.8 GHz
radio for voice and data transmission and receipt. Further, the security device 10, using wireless devices 30, is ideally capable of selecting between available communication
network signals, determining which network signal is the best signal at a given time, and
automatically switching between the available signals to maintain optimum reception and
transmission quality. For example, the security device 10 ideally has middleware that
measures the received signal strength of the various network cards and can select the best
signal unless the user chooses to "lock in" a particular source. If the security device 10
starts using an RF wireless network card and encounters interference, it can seamlessly
switch to another wireless transmission mode without the user knowing a change was made. The security device 10 can also operate whether or not the transmitting and
receiving devices 26, 28 are enabled, hi other words, the security device 10 can also
operate as a stand alone unit. Preferably, when operating as a stand alone unit, the
security device 10 continues to look for wireless or wired networks with which it can
authenticate. If such a network is located, the security device 10 will preferably exchange
pass codes and information with the corresponding network server to transition from
stand alone to network operation.
The security device 10 further includes a device for producing ultra wide band
ground penetrating radar 34 and millimeter wave radar in communication with the central
processing unit 12. Ideally, the security device 10 uses an ultra wide band ground
penetrating radar unit that has been modified to work in a lower power smaller scale
version or a millimeter wave radar. Traditional ultra wide band ground penetrating radar
units are typically used to non-destructively examine the earth for items buried
underground, such as pipes, tree roots, and archeological artifacts. Ground penetrating radar is also commonly used to examine the internal configuration of concrete structures
such as bridges and roadways. The ultra wide band ground penetrating radar unit 34 of
the present invention is intended to be used for locating and identifying hidden objects,
such as items of interest in closed, non-metal containers. For example, the ultra wide
band ground penetrating radar unit 34 could be used to non-destructively examine the
contents of a piece of luggage at an airport. The millimeter wave radar can be used to
non-destructively examine the contents of a cargo container coming into the United States
through U.S. Customs and Border Patrol ports. Such examination provides an efficient way to inspect the contents of the luggage or cargo container for items of interest, such as
items that may pose a security risk. The ultra wide band ground penetrating radar unit 34
can ideally operate within 5 meters from the container or other item being examined, and
can ideally penetrate up to 10 meters into the container or other item. Other RF sources, such as the global positioning system 44 and the transmitting and receiving devices 26,
28, are preferably unaffected by the operation of the ultra wide band ground penetrating
radar unit 34.
Many other devices and capabilities are also ideally included in the security
device 10 of the present invention. Audio capability, including a sound producing device
40, such as speakers, and a sound recording device 42, such as a digital sound recorder
including a microphone, is preferably included. A global positioning system 44, a
mapping system 46, a biometric scanner 48 including a National Institute of Standards
and Technology (NIST) approved fingerprint sensor, a radio frequency identification
(RFID) interrogator and reader 50, a Bluetooth™ RF link for headsets and printers 51, bar code reading capability 52, two universal serial bus (USB) ports 53, an Ethernet port and
a software authentication system 54 are also preferably provided in the security device 10.
[In addition, the security device 10 is preferably a complete personal computer (PC) that
runs on Microsoft® XP operating system and supports voice, data, video conferencing,
email, Microsoft® Office® files, any software that operates under or over Microsoft® XP
operating system, forms generation, and document scanning. It should be understood,
however, that the security device 10 of the present invention can be configured to run on
any operating system including Linux, MacOS, Solaris and Unix.
All of the above-described features of the present invention are ideally contained
in a lightweight, handheld housing 56 that is durable enough to meet Military Standard
80 IF, waterproof, and able to withstand virtually all weather conditions and climates with
an operating temperature range of -30 to +50° Celsius. The entire security device 10 is
also ideally very lightweight, preferably between 2.5 and 5 pounds including the battery.
The handheld, lightweight, wireless security device 10 can easily be carried and operated using one or both hands, as shown in FIG. 2b. The security device 10 can be easily
carried and used by personnel in, for example, transportation security, transportation
operations, corporate security, education security, first responder organizations,
government agencies, the Department of Defense and the Department of Homeland
Security.
The security device of the present invention can be used in a number of ways and
for a number of purposes, and thus the present invention also contemplates various
methods of using the security device. For example, a method for identifying objects of interest in closed containers, such as but not limited to luggage bags at airports or cargo
containers at U.S. Customs and Border Patrol ports, is contemplated by the present
invention, as well as a method for locating hidden life forms, such as security-breaching
individuals or other suspects. Another significant method contemplated by the present
invention is a method for addressing a security breach, such as but not limited to a
security breach at an airport. The methods are further described using the examples below.
Example 1: Identifying Objects of Interest in Closed Containers. The ability to
identify objects of interest in closed containers is an important security issue. For
example, airport security personnel often find abandoned luggage bags. Because
abandoned luggage bags could contain items that pose very serious security risks, such as
bombs, airport personnel must treat such luggage very carefully. Today, airport personnel have three options for handling the abandoned bag: pick up and move the bag, call for
back-up help from inside or outside the airport, or call the bomb squad. With any of
these current options, the airport personnel must make a decision without first knowing
anything about the contents of the bag.
Using the security device of the present invention, however, the airport personnel
could scan the bag with ultra wide band ground penetrating radar and, view the images
produced by the radar in real-time to see if any objects of interest or concern, particularly
dense objects, are present in the bag. If there are no dense objects, the airport personnel
should be able to pick up the bag and move it to another location to be x-rayed and
physically inspected. If there are dense objects, the airport personnel would then know they need to call for back up help or call the bomb squad because an object of interest or
concern is in the bag. Once help arrives, the responding persons will be able to see the
images produced by the radar, giving them additional information for deciding how best to proceed.
This same scenario could happen in other locations as well, including other transportation centers, office buildings, trade and social conventions, sporting events,
education venues, power plants and hospitals. Personnel at any of these locations could
easily carry the security device of the present invention for use in similar situations. This
use of the security device is also particularly useful for non-destructively examining cargo
containers at U.S. Customs and Border Patrol ports for objects of interest or concern.
Example II: Locating Hidden Life Forms. Locating hidden life forms can also be
an important security measure. For instance, a suspect may try hiding from his pursuers
behind a wall or around a corner of a building where traditional surveillance equipment
cannot see him. The security device of the present invention, however, will be able to see
the hiding suspect using the infrared capability of at least one of its cameras. With a
camera in infrared mode, the user can scan an area in which a suspect may be hiding and
capture infrared images of the area. If a suspect, or any other life form, is present, the
infrared image will produce an indicative heat signature. Thus, if a suspect was hiding
around a corner, the infrared camera image of the corner area would show a heat
signature indicating that a life form was near the corner. This feature of the security
device could be used in any situation wherein locating hidden individuals or other life
forms is desired. Example HI: Addressing a Security Breach. Being able to adequately address a
security breach is an essential function of security personnel in all secured venues. For
example, almost every day in an airport someplace in the world, someone breaches the
airport security system by walking through a security checkpoint without stopping.
Today, when such a security breach happens, the breaching individual's picture is usually
captured by a security camera. When airport security personnel realize a breach has
occurred, they typically send a message to the rest of the security personnel in the airport,
usually by sounding a chime or flashing selected lights in the airport, to alert them of the
breach. The security command and control center then describes the breaching individual
to all of the security staff, usually by two-way radio. Some locations in the airport,
however, may not be able to adequately receive the two-way radio signal and thus some
security personnel could miss the description entirely. In addition, the verbal description,
as opposed to a visual description or actual photograph, of the breaching individual may
not be accurate or may be too broad or too narrow, making it difficult for airport security to locate and apprehend the breaching individual. If the breaching individual is not
apprehended, the Federal Aviation Administration and/or the Transportation Safety
Administration require that the airport terminal be cleared so that a physical search can be
performed. This procedure can close an airport terminal for several hours, costing
hundreds of millions of dollars in lost revenues and delaying hundreds of flights.
If the airport security personnel carried security devices according to the present
invention, however, it would be much easier to quickly locate and apprehend the
breaching individual. For instance, the picture from the security camera could be sent from the security command and control center to the security devices carried by all security personnel. Thus, all security personnel would be able to see an actual picture of
the breaching individual, instead of relying on a verbal description. The video feeds from
the security camera could also be sent directly to the security devices carried by all
security personnel, so that security personnel could view breaching individual's picture
taken at any location, not just from the security command and control center. Further,
once the security personnel find an individual who appears to be the person in the picture,
the security personnel could take a photograph using the security device and send the
picture to the command and control center and/or to other personnel carrying security
devices and confirm that they have located the correct individual. Using the security
device's biometric scanner, the security personnel could also ask the individual to provide
a fingerprint, which the security device could then send to an NIST server to verify that
the individual is who he or she claims to be.
The present invention further contemplates a method for preventing compromise
of the security device using a security lock out system. Preventing compromise of the
device is an important function of the device because it helps ensure that the device can
only be used by those authorized to use it. Ideally, the command and control center for
the security personnel at a secured venue would provide an authorized individual with a
time limit for logging into or authenticating with the security device. If the time limit
expires before the authorized individual logs in or authenticates, the display screen on the
security device ideally turns black and an innocuous message such as, "please standby"
appears. The microphone, sound recording device, cameras, and global positioning system or other location sensor are ideally activated so that the security command and
control center can locate the security device, as well as see and hear everything the
security device records so that if the device is taken by a person with nefarious intent,
their activities could be monitored without their knowledge.
While the invention has been described with reference to preferred embodiments,
it is to be understood that the invention is not intended to be limited to the specific
embodiments set forth above. It is recognized that those skilled in the art will appreciate
certain substitutions, alterations, modifications, and omissions may be made without
parting from the spirit or intent of the invention. Accordingly, the foregoing description
is meant to be exemplary only, the invention is to be taken as including all reasonable
equivalents to the subject matter of the invention, and should not limit the scope of the
invention.

Claims

CLAIMSWhat is claimed is:
1. A portable handheld security device comprising:
a central processing unit in communication with a memory storage device, a video
display screen, at least one camera, a transmitting device, a receiving device, an input
device, a power supply, and a device for generating at least one type of radar for locating
hidden objects, and producing images of the hidden objects on the video display screen.
2. The security device of claim 1, wherein the transmitting device and the receiving
device are capable of selecting between available communication network signals,
determining which network signal is the best signal at a given time, and automatically
switching between the available signals to maintain optimum reception and transmission
quality.
3. The security device of claim 1 , wherein the input device has a first set of user-
interface controls and a second set of user-interface controls, and wherein either the first
and/or the second set of user-interface controls is automatically activated based on
conscious or unconscious user selection within a predetermined period of time.
4. The security device of claim 1, wherein the security device can be used for
locating dense objects in luggage bags.
5. The security device of claim 1, wherein the security device can be used for
identifying objects of interest in closed containers.
6. The security device of claim 1 , wherein the security device can be used for locating hidden life forms.
7. The security device of claim 1, wherein the security device can be used for
addressing a security breach.
8. The security device of claim 1, wherein the security device includes a security
lock-out system.
9. The security device of claim 1, wherein transmitting and receiving occurs over a wireless device capable of operating over a plurality of wireless local area networks.
10. The security device of claim 1, wherein transmitting and receiving occurs over an
internet connection.
11. The security device of claim 1 , wherein the security device operates whether or
not the transmitting device and receiving device are enabled.
12. The security device of claim 1, wherein the security device meets Military
Standard 810F.
13. The security device of claim 1, wherein the power supply is a battery capable of
holding a charge for up to 8 hours.
14. The security device of claim 1, wherein the security device includes digital full
motion video and still-screen image capture, recording, and processing.
15. The security device of claim 1, wherein the security device includes a sound
producing device and a sound recording device.
16. The security device of claim 1 , wherein the security device includes a biometric
scanner.
17. The security device of claim 1 , wherein the security device includes bar code
reading capability.
18. The security device of claim 1 , wherein the security device includes a radio
frequency identification reader and interrogator.
19. The security device of claim 1, wherein the security device includes a global
positioning system.
20. The security device of claim 1, wherein the security device includes a mapping
system.
21. The security device of claim 1, wherein the video display screen is a touch screen.
22. The security device of claim 1, wherein the video display screen supports direct
free hand drawing input.
23. The security device of claim 1, wherein the security device comprises two digital
cameras, at least one camera having the capability for capturing images in infrared light.
24. The security device of claim 1, wherein the radar is ultra wide band ground
penetrating radar.
25. The security device of claim 1, wherein the radar is millimeter wave radar.
26. The security device of claim 1 , wherein the radar is ultra wide band ground
penetrating radar and millimeter wave radar.
27. A portable handheld security device comprising:
a central processing unit in communication with a memory storage device, a video
display screen, at least one camera, a transmitting device, a receiving device, an input
device, and a power supply; and
wherein the transmitting device and the receiving device are capable of selecting
between available communication network signals, determining which network signal is
the best signal at a given time, and automatically switching between the available signals
to maintain optimum reception and transmission quality.
28. The security device of claim 27, wherein the security device includes a security lock-out system.
29. The security device of claim 27, wherein transmitting and receiving occurs over
an internet connection.
30. The security device of claim 27, wherein the security device operates whether or not the transmitting device and receiving device are enabled.
31. The security device of claim 27, wherein the security device that is tested to
Military Standard 810F.
32. A portable handheld security device comprising: a central processing unit in communication with a memory storage device, a video
display screen, at least one camera, a transmitting device, a receiving device, a multi
frequency antenna, an input device, and a power supply; and
wherein the input device has a first set of user-interface controls and a second set
of user-interface controls, and the first and second sets of user- interface controls are
selectively operable by users either independently or simultaneously.
33. The security device of claim 32, wherein the video display screen is a touch
screen.
34. The security device of claim 32, wherein the video display screen supports direct free hand drawing input.
35. A method for identifying objects of interest in closed containers, the method comprising:
providing a portable handheld security device having a central processing unit in
communication with a memory storage device, a video display screen, an input device, a
power supply and a device for generating ultra wide band ground penetrating radar or
millimeter wave radar for locating hidden objects and producing images of the hidden
objects on the video display screen;
holding the portable handheld security device over the closed container;
activating the device for generating radar;
displaying the image produced by the device for generating radar on the video
display screen; and
reviewing the image for objects of interest.
36. A method for locating hidden life forms, the method comprising:
providing a portable handheld security device having a central processing unit in
communication with a memory storage device, a video display screen, at least one camera
having infrared capability, an input device, and a power supply;
holding the portable handheld security device with the camera facing an area in
which a life form may be hiding;
activating the camera's infrared capability; scanning the area with the portable handheld security device to capture infrared
images of the area with the camera;
displaying the infrared images on the video display screen; and
reviewing the infrared images for a heat signature produced by a life form.
37. A method for addressing a security breach, the method comprising:
transmitting a signal including images of an individual or item of interest;
providing at least one portable handheld security device having a central
processing unit, a memory storage device, a video display screen, a receiving device, an input device, and a power supply;
receiving the signal on each of the portable handheld security devices;
viewing the images on the portable handheld security devices; and
using the images to locate the individual or item of interest.
38. The method of claim 37, further comprising the steps of:
using the portable handheld security device to capture a video image of the
individual or item of interest; and
transmitting the video image to at least one receiving device to confirm the
identity of the individual or item of interest.
39. The method of claim 37, further comprising the steps of:
using the portable handheld security device to capture a still-screen image of the
individual or item of interest; and transmitting the still-screen image to at least one receiving devices confirm the identity of the individual or item of interest.
40. The method of claim 39, wherein at least one of the receiving device includes a
portable handheld security device.
41. A method for preventing compromise of a portable handheld security device, the
method comprising:
providing a network system having a command and control center; providing a portable handheld security device in communication with the
command and control center, the portable handheld security system having a central
processing unit in communication with a memory storage device, at least one camera, a
sound recording device, a transmitting device, a receiving device, an input device, a
global positioning system, and a power supply;
providing means for logging in to the network system using the portable handheld
security device;
applying a time limit to the means for logging in to the network system;
activating the camera for producing images, the sound recording device for
recording sounds, and global positioning system for locating the portable handheld
security device if the time limit expires before the means for logging in to the network
system are satisfied; and
transmitting the images produced by the camera, the sounds recorded by the
microphone, and the location of the security device determined using the global
positioning system to the command and control center.
EP05802879A 2005-07-08 2005-07-08 Portable handheld security device Withdrawn EP1908034A1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2005/024506 WO2007008204A1 (en) 2005-07-08 2005-07-08 Portable handheld security device

Publications (1)

Publication Number Publication Date
EP1908034A1 true EP1908034A1 (en) 2008-04-09

Family

ID=37637444

Family Applications (2)

Application Number Title Priority Date Filing Date
EP05802879A Withdrawn EP1908034A1 (en) 2005-07-08 2005-07-08 Portable handheld security device
EP05800780A Withdrawn EP1929449A1 (en) 2005-07-08 2005-07-29 Portable handheld security device

Family Applications After (1)

Application Number Title Priority Date Filing Date
EP05800780A Withdrawn EP1929449A1 (en) 2005-07-08 2005-07-29 Portable handheld security device

Country Status (8)

Country Link
EP (2) EP1908034A1 (en)
JP (2) JP2009500742A (en)
AR (2) AR050375A1 (en)
AU (2) AU2005334258A1 (en)
CA (1) CA2614344A1 (en)
IL (2) IL188625A0 (en)
TW (1) TWI307583B (en)
WO (2) WO2007008204A1 (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102009054950A1 (en) * 2009-12-18 2011-06-22 Hilti Aktiengesellschaft handheld instrument
EP2492835A1 (en) * 2011-02-22 2012-08-29 HTC Corporation Data security management systems and methods
WO2013009280A2 (en) * 2011-07-11 2013-01-17 Maxwell Ryan Lee Method of cryptology to authenticate, deny, and disinform
US20170323543A1 (en) * 2014-04-08 2017-11-09 Lawrence F Glaser Video image verification system utilizing integrated wireless router and wire-based communications
JP6394504B2 (en) * 2014-06-13 2018-09-26 株式会社デンソーウェーブ RFID reader
US10571591B2 (en) 2016-04-28 2020-02-25 Fluke Corporation RF in-wall image registration using optically-sensed markers
US10585203B2 (en) 2016-04-28 2020-03-10 Fluke Corporation RF in-wall image visualization
US10209357B2 (en) 2016-04-28 2019-02-19 Fluke Corporation RF in-wall image registration using position indicating markers
US10254398B2 (en) 2016-04-28 2019-04-09 Fluke Corporation Manipulation of 3-D RF imagery and on-wall marking of detected structure
US10564116B2 (en) 2016-04-28 2020-02-18 Fluke Corporation Optical image capture with position registration and RF in-wall composite image
US10302793B2 (en) 2016-08-04 2019-05-28 Fluke Corporation Blending and display of RF in wall imagery with data from other sensors
TWI579729B (en) * 2016-11-11 2017-04-21 南開科技大學 Server login authentication system and method thereof
US10444344B2 (en) 2016-12-19 2019-10-15 Fluke Corporation Optical sensor-based position sensing of a radio frequency imaging device
CN209784532U (en) * 2018-03-30 2019-12-13 清华大学 Safety inspection system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6359582B1 (en) * 1996-09-18 2002-03-19 The Macaleese Companies, Inc. Concealed weapons detection system
US6720905B2 (en) * 2002-08-28 2004-04-13 Personnel Protection Technologies Llc Methods and apparatus for detecting concealed weapons
JP2004159146A (en) * 2002-11-07 2004-06-03 Nippon Telegr & Teleph Corp <Ntt> Communication network and packet transfer device
AU2002368478A1 (en) * 2002-12-19 2004-07-14 Fujitsu Limited Mobile node
US7109859B2 (en) * 2002-12-23 2006-09-19 Gentag, Inc. Method and apparatus for wide area surveillance of a terrorist or personal threat
US6806821B2 (en) * 2003-03-12 2004-10-19 Itt Manufacturing Enterprises, Inc. Apparatus and method for rapid detection of objects with time domain impulsive signals
WO2005048206A1 (en) * 2003-11-13 2005-05-26 All Set Marine Security Ab Method and system for monitoring containers to maintain the security thereof
DE102004007315A1 (en) * 2004-02-14 2005-08-25 Robert Bosch Gmbh Short-range radar unit for detecting objects in a medium, e.g. for detecting reinforcement bars or electrical wiring buried in a wall, has one or more additional sensors, e.g. inductive, capacitive, photometric or infrared

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2007008204A1 *

Also Published As

Publication number Publication date
TW200703108A (en) 2007-01-16
AR055102A1 (en) 2007-08-08
JP2009500742A (en) 2009-01-08
AR050375A1 (en) 2006-10-18
JP2009500743A (en) 2009-01-08
WO2007008204A1 (en) 2007-01-18
CA2614344A1 (en) 2007-01-18
IL188623A0 (en) 2008-04-13
EP1929449A1 (en) 2008-06-11
AU2005334258A1 (en) 2007-01-18
WO2007008217A1 (en) 2007-01-18
AU2005334203A1 (en) 2007-01-18
IL188625A0 (en) 2008-04-13
TWI307583B (en) 2009-03-11

Similar Documents

Publication Publication Date Title
US7209035B2 (en) Portable handheld security device
EP1908034A1 (en) Portable handheld security device
US9411997B1 (en) Systems and methods for tracking subjects
US20040004543A1 (en) Security system and method with realtime imagery
US20170223302A1 (en) Critical incident solution
US8917909B2 (en) Surveillance including a modified video data stream
US20210405179A1 (en) Systems and Methods for Noninvasive Detection of Impermissible Objects
RU2460144C2 (en) Monitoring system
Muthusenthil et al. CCTV surveillance system, attacks and design goals
CN109271547A (en) A kind of tourist&#39;s technique for delineating, device and system based on scenic spot real name
US12000924B2 (en) Systems and methods for noninvasive detection of impermissible objects
JP2021056869A (en) Facility user management system
KR101914386B1 (en) Mobile terminal for construction supervision
US11423722B1 (en) System and method of identifying and verifying a valid entry of an application user into a venue using contactless credential verification
JP2019114857A (en) Monitoring system
GB2568678A (en) Method of monitoring video
US20120062733A1 (en) Smart target surveillance system
US20220260705A1 (en) Systems and Methods for Noninvasive Detection of Impermissible Objects Using Decoupled Analog and Digital Components
US20220392322A1 (en) Multisensor Security System with Aircraft Monitoring
Mhaiskar et al. Automated Surveillance System using Raspberry pi
Mennell Technology Supporting Crime Detection—An Introduction
Weaver Privacy in an Era of Advancing Technology
Kaur et al. STUDY OF REDUCING THE UNCERTAINTY FOR THE SYSTEM TO DETECT THE GPS SPOOFING
sung Kim CCTV Surveillance System, attacks and design goals.
Sutor et al. Multi sensor technologies augmenting video surveillance: Security and data fusion aspects

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20080208

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20090203