HK1094490A - Electronic security system for monitoring and recording activity and data relating to persons - Google Patents
Electronic security system for monitoring and recording activity and data relating to persons Download PDFInfo
- Publication number
- HK1094490A HK1094490A HK07101363.0A HK07101363A HK1094490A HK 1094490 A HK1094490 A HK 1094490A HK 07101363 A HK07101363 A HK 07101363A HK 1094490 A HK1094490 A HK 1094490A
- Authority
- HK
- Hong Kong
- Prior art keywords
- data
- identification
- individual
- signal
- field
- Prior art date
Links
Description
Cross Reference to Related Applications
This application claims priority from: U.S. patent application 60/479,127, filing date 2003, 6/17 entitled "electronic safety System for monitoring and recording Activity and data relating to personnel and cargo"; copending patent application (attorney docket No. 5264-0002-2), entitled "electronic security system for monitoring and recording activity and data related to cargo"; copending patent application (attorney docket No. 5264-0002-3), entitled "electronic security system for monitoring and recording activity and data relating to an organization and its agents". The above application is incorporated by reference herein in its entirety.
Technical Field
The present invention relates to systems and methods for electronically monitoring and recording data and activity about a person, and more particularly to monitoring and recording dynamic real-time data about an individual, particularly for use by travelers in situations where security checks are provided.
Background
Storage processing systems are known that provide personal identification and information in many formal and business contexts, where such systems store data in electronic form and similarly process and transmit data about individuals. These objectives are achieved, for example, through the use of portable microprocessor devices, including computers, "smart cards" with microchips, and electronically scanned labels and barcodes, light and radio sensors, and other technologies.
Typically, the devices used to store, process and transmit data are linked in any of a variety of ways to establish a computer-based network that communicates with the input and output devices to store and process data about the individuals. These networks include, for example, the internet and world wide web, as well as proprietary networks. The transmission of the data signal may be obtained by a modem, cable, Radio Frequency (RF) transmission, or the like.
Despite the vast number of examples of applications for which these well-known hardware and software techniques are used in business and social activities to acquire, store and process communication data in a variety of systems and methods, the systems currently used to acquire, manage, process and transmit data signals have not been able to effectively track people entering and exiting in several countries. In particular, there is a lack of means for effectively linking such communications in real time between various governmental agencies and authorities in a collaborative and beneficial manner.
Currently, state governments and local governments in the united states have produced a series of different photo identification cards that contain textual information, now including a picture of an individual. The most common of these are driver licenses issued by each of the 50 states and regions. Similarly, many states require permission for weapon holding, which again requires additional cards containing information about the individual and the categories of weapons that the individual is allowed to carry. Many companies also issue photo identification cards for use in their respective business activities. Most of these photo identification information only contains text material such as name, address, date of birth, eye color, etc. and photos. Some identification cards already used in industry contain more information, such as fingerprints.
However, these current systems for identifying persons do not take advantage of new technologies that have been used to identify and track the shipment of goods, such as bar codes, and do not provide an effective standardized and tamper-proof identification system for individuals.
In the past, even non-uniform personal identification has met the need, as many identifications have been used for simple operations, such as identification used by police officers in routine traffic inspections, bill checks, and the like. Foreign governments have their own identity recognition systems implemented with security measures, which vary in efficiency. There is currently a great deal of debate as to whether mexican visitors in the united states can use their mexican identification cards for similar identification purposes in the united states.
The problem with current techniques for establishing photographic identification is exacerbated by the large number of people entering and exiting the united states. There is no effective mechanism to systematically and extensively provide a security mechanism to identify and track individuals moving in the united states. The serious homeland security incident, which occurred on day 11/9/2001, and the enemy of foreign terrorists, all indicate that the current systems for identification are completely unsuitable for use. The united states has now modified the application procedures for issuing visas and applying for passports to foreigners and is looking at improving the security measures for document creation. There is a need for a system that can track those who enter the united states, travel in the united states, and then leave the united states, thereby limiting and preventing the opportunity for large-scale security events to occur. In addition, there is a need for a system that provides the convenience of information exchange between authorized users of the system.
Disclosure of Invention
In one aspect, the present invention is directed to an apparatus for providing secure and unique identification of an individual. Such a device comprises means for electromagnetically recording and storing data and identification parameter values representing a specific individual. Preferably, the apparatus is capable of receiving and storing data in a plurality of fields including an identifier field adapted to receive signals identifying a particular individual only from an allowed source and a travel field adapted to receive signals corresponding to an order of travel in question.
In another aspect, the present invention is directed to a system for tracking and identifying individuals. Such a system comprises: an electromagnetic identification device having a plurality of data fields, each data field adapted to receive a signal uniquely identifying an individual; a writer for encoding the identification signal into the electromagnetic identification device data field; a controller for receiving a signal uniquely identifying an individual and storing the individual identification signal in a main database storage device; and a reader adapted to interrogate the unique individual identification signals stored on said electromagnetic identification means and to communicate with said controller for comparing respective individual identification signals stored on said primary database storage device with signals received from said electromagnetic identification device and generating an alarm signal when the comparison shows a discrepancy.
Drawings
FIG. 1 is a schematic diagram of an electronic identification system for an individual identification system.
FIG. 2 is a schematic diagram of the system of FIG. 1 in which identification information is written to a plurality of cards included in the system.
Fig. 3 is a plan view of the identification card of the present invention.
Fig. 4 and 5 are perspective views of a handheld reading device that may be used by the electronic identification system of the present invention.
FIG. 6 is a simplified flow diagram illustrating a process in which a personal traveler enters an airport or checkpoint such as a border checkpoint with an electronic identification card.
Fig. 7 is a simplified flow diagram illustrating linking an electronic identification card to databases.
FIG. 8 is a simplified flow diagram illustrating tracking foreign traveler departures.
FIG. 9 is a simplified flow diagram illustrating tracking the return of a U.S. citizen from a foreign country.
FIG. 10 is a simplified flow diagram illustrating tracking a ticket-purchasing individual's domestic travel through a carrier.
FIG. 11 is a simplified flow diagram illustrating the issuance of a smart visa to a first-time-to-entry foreign visitor.
FIG. 12 is a simplified flow diagram illustrating the process of travel of a foreign visitor using the previously issued smart visa.
Fig. 13 is a simplified flow diagram illustrating the issuance (or replacement) of a new smart passport to a U.S. citizen.
Fig. 14 is a simplified flow diagram illustrating the exchange of a conventional passport with a smart passport for a U.S. citizen.
Fig. 15 is a simplified flow diagram illustrating the issuance of a national identification card.
Detailed Description
The present invention is directed to a secure identification card for an individual and a system for using such a secure identification card. The card is particularly suited for use with a system for tracking individuals, particularly travelers into the united states, and may determine various conditions immediately through real-time communication with a master database.
The present invention contemplates an integrated system of identification cards, passports, visas, and similar identification devices that cooperate with a central system, accessible by various government agencies, including but not limited to: federal research bureau (FBI), state department, department of defense, immigration departments, customs, state and local police departments, each entering the port of the united states, and the like.
A key aspect of the present invention is the use of identification cards for all those in the united states. Such cards include visually determinable identifying information, but may further include digital photographs, biometric fingerprints, and encoded information. In one embodiment, the encoded information is stored electronically in a microchip embedded in the structure of the card itself. Alternatively, the encoded information may take the form of a message having both transmit and receive capabilities, or similar transmit/receive functionality (e.g., via Radio Frequency (RF)) to automatically read data programmed into the microchip on the card. In any embodiment, the digital photograph enables the system to be used by a face recognition system (facial printing). Biometric fingerprints allow for fast resolution of authentication queries through fingerprint technology and databases. The encoded information is readable by a reader and linked to a centralized database containing records of persistent information about the card-holder. Preferably, the card is made tamper-resistant by encapsulating the identification mechanism (e.g., via lamination techniques) and incorporating a holographic image and/or encrypting the encoded information in the card.
Another key aspect of the present invention is to make the identification card a "smart" passport that allows an individual to travel outside the united states. As used herein, the term "intelligent," when used to describe the device of the present invention, means that applicable means can be used to write data to, store data to, erase data from, and rewrite data to the device. The use of smart passports incorporating "watch" technology allows the government to track and monitor the smart card holder in any readable environment, particularly when the smart card holder enters, passes through, or exits a secure area such as a border checkpoint, airport, port, or monitored building or area. The card itself contains relevant data which is substantially the same as the data stored in the master database.
Referring to fig. 1, a system embodiment of a secure identification card system 10 for an individual has: controller 12, database 14, display device 16, reader 18, at least one card 20, and writing device 22. Each individual has a given card. In a preferred embodiment, controller 12 is a host computer operable to perform the operations disclosed hereinafter and having sufficient memory to enable appropriate processing of information received from reader 18 and for display. Preferably, card 20 is a smart identification device containing information specific to the holder of the card, such information preferably being a digital photograph of the holder, a biometric fingerprint of the holder, and a microchip.
Referring to fig. 2, the illustrated card 20 depicts three separate cards 20a, 20b, and 20c for three separate persons. Although only three cards are shown, it should be understood that any number of cards may be used with the system. Preferably, the card is issued to every person who lives in the united states and/or travels in the united states. As detailed below, the read/write functions to the card are tightly controlled and can typically only be performed by the card issuer.
Preferably, each of cards 20a, 20b and 20c stores unique data for the card-holder. Referring to fig. 3, the data stored on the card 20 preferably includes a digital photograph 24, a biometric fingerprint 26, a holographic image 28, and an internal memory chip 30 containing encoded data. Examples of data that may be encoded into and stored in the microchip include, but are not limited to, driver's driver license information (e.g., identification number, vehicle registration date, and violation history), social security number, address (past and present), personal data (e.g., date of birth, height, weight, hair color, eye color, etc.), electronic and telephonic contact information, medical records (e.g., allergies, medications, medical abuse history, whether there are any types of prostheses (which are useful in determining why a person will always trigger an alarm when passing through a metal inspection device) or other health information), criminal records (convictions, guilt, sexual assault conditions, past guilt, etc.), aliases, family data (recent relatives contact information, and information useful in determining the person's whereabouts), financial and banking information (e.g., credit card number and credit limits, etc.) Savings account number and balance, credit history and ratings, salary history, etc.), weapon purchase and ownership records, marital status, affiliated political parties, ethnic background and nationality status, employment and unemployment history, education history, book borrowing records, consumer purchase records, property ownership and lien information, court judgment information, and history regarding receiving relief and other government benefits, insurance confirmations, etc.
In one embodiment, the internal memory slice 30 of the card 20 typically comprises an EEPROM with entire 1024-bit memory. Byte boundary memory addressing and byte boundary memory blocking are used. The communication platform for receiving data from the memory slice 30 is preferably an anti-collision protocol binary tree type, anti-collision algorithm. Additionally, the information programmed into the memory slice 30 may include a global positioning number, a date and time of card activation, a customs coordination number and a coordination number description, and the like. The identification data of the port can also be written to the card at the time of entry and exit, and such data is compared with the corresponding data retained by customs at the time of entry and exit, for verification of travel and system operation if necessary.
Alternatively, card 20 may also include a signal device 32, which may be any suitable electromagnetic transceiver. In one embodiment, the signaling device is an Intermec 915MHz Radio Frequency Identification (RFID) device that has passive operation and conforms to EPC (electronic product code) and ISO (international organization for standardization) standards. Such devices have a read range of up to 13 feet and can be mounted in a sticker (packer) and can further double as a human-recognizable tag.
The card 20 with the RFID signaling device may be read by the reader 18. In the preferred embodiment, the reader has the ability to interrogate and read the signaling devices 32 on each card 20, to view the data on the card in use, to write the card data, and to clear and overwrite the card data. Several readers 18 may communicate as part of a signal network. Preferably, the system uses an intermec itrf91501 reader, which is a fixed 915MHz reader, and a card writer has four (4) address antenna ports, an RS232 serial port, and a write capability to read RFID signals within twelve microseconds and perform verification on an average of 31 microseconds per byte per card. Such devices utilize a single antenna to read at a distance of about 3 meters.
Alternatively, the reader 18 may be an Intermec IP3 portable reader used by an individual remotely. Referring to fig. 4 and 5, it can be seen that Intermec IP3 has mobile read/write capability and includes an Intermec 700 family of mobile computers. Reading operations can be efficiently performed by internal circuit polarized antennas powered by rechargeable lithium ion battery packs, and RFID signal data processed by computer driven system applications. The alphanumeric keypad 40 and the display 42 provide for input communication from and output communication to the user. The portable reader is constructed for indoor and outdoor use, has an operating temperature of +14 ° F to +140 ° F, is rain-proof, dust-proof, IP 64-compliant, is powered by a lithium ion 7.2 volt battery, and uses Microsoft Windows fordocket PC as the operating system. There may be 64 megabytes or 128 megabytes of Random Access Memory (RAM) and 32 megabytes of flash Read Only Memory (ROM). The internal slot has a secure number and a Compact Flash (CF) Type II card. It relies on the standard communication protocol RS232, irda1.1(115 kbytes per second (KBPS)). Readers configured with 10BASE T-Ethernet and USB ports may also be used. There are also integrated radio and scanner options for the reader. Preferably, the reader 18 may be adapted to an inbound workstation 44 to provide desktop connectivity.
At any time, an authorized user (having a unique user identifier or password and meeting established security requirements) may read a file from the card 20 using the reader 18 to view the data programmed on the card 20. In a preferred embodiment of the invention, the read file may be copied or transferred to a computer or other control device, such as a laptop computer, desktop computer, or Personal Digital Assistant (PDA). Information from the card 20 may be generated, displayed, printed, or transmitted to a central computer for processing. Under the control of a control mechanism (e.g., software), the information from card 20 may be compared to other information, such as results obtained from a face scan of the card-holder, to determine whether the card-holder is the same person as the person to whom card 20 was issued. Reports indicating the accuracy of the data or security breaches may be printed and/or displayed.
The system 10 described above with reference to fig. 1-5 is configured to be computer controllable to collect data. The system can be easily connected to a PC data control system through a high performance ethernet interface line.
The electronics of the above-described system can input, process, store and communicate data relating to the identification of an individual and link such data to terminals by executing various algorithms. The data can also be used to cross-index with existing databases to provide functionality for tracking individuals at discrete points during their travel.
The apparatus of the system is also adapted to construct a system for continuous tracking of individuals. In particular, by incorporating an RFID signaling device in the middle of a garment, bracelet, necklace, etc., the movement of an individual can be determined by continuously interrogating the RFID device. Such continuous tracking systems are particularly useful in tracking suspected or known criminals or terrorists. This is also useful in monitoring a group of prisoners. In any event, the individual may or may not be aware of the tracking of the individual.
In any use of the system, a non-intrusive, remote, wireless monitoring of individual location and movement is provided. Intermittent polling of the signaling devices of the system (i.e., reading of the card) allows the location of the individual to be viewed at a given point for security purposes and further allows the relevant information to be communicated to the appropriate parties for security purposes. Continuous interrogation of the signaling devices of the system allows real-time or near real-time supervision of individuals, which is useful for predicting the undesirable gathering of individuals and for assessing whether police or military action is required. Preferably, the transmission of data is integrated by satellite, GPRS (general packet radio service) or cellular applications to provide real-time or near real-time analysis.
For us citizens who do not carry passports, smart passports incorporating the techniques described herein are used as national identification cards. Functionally, the card is identical to a smart passport issued to a foreigner entering the united states. In the united states, the smart passport for us citizens preparing for travel to foreign countries, as well as the smart passport for people in this country who are not intending to travel, is directly linked to the traveler's social security number and becomes the primary tool for identification of the traveler when traveling in or returning to the united states.
When a U.S. citizen preparing for travel to a foreign country applies for and receives a new smart passport, a record is created in the central computer system that includes a large master database with such textual information. The individual record contains all of the usual passport information including, but not limited to, background surveys, biometric fingerprints, digital photographs, and itineraries of travel. In a particular example, it may be linked to a carrier data source (such as an airline or marine carrier) and to the RF signal devices contained on the card. The database may be accessed by authorized government officials at the appropriate read-only or read-write level to maintain the integrity of the information.
The information of the database can be upgraded if necessary. For example, when the individual obtains a driver's license, the information is recorded. If the individual receives a motorcycle license or commercial driver's license, the information is similarly encoded into the computer system for storage.
Smart passports may be documents also available to foreigners in the united states, including those standing foreigners who have a "green card" and are permitted to work in the united states, as well as those who travel for business or vacation. When a foreign traveler enters the country for entry checking, the smart passport is scanned. The customs officials have full access to the traveler's relevant background information available on the smart passport. As part of the entry process, the foreign traveler enters a biometric fingerprint on the biometric pad. The biometric fingerprint collected at the entry point is compared to fingerprints stored in the database to ensure that the individual entering the country is indeed the individual who applied to receive the smart passport.
The traveler must state how long to stay in the house as evidenced by the return ticket and the connection to the carrier database. This allows the customs officials to verify the date of departure and the expected port again in real time. When the individual is finished staying and leaves through an airport, port or border gate, the appropriate information and fingerprint is collected to verify that the individual leaving the united states is indeed the person holding the smart passport. This information is provided to the master database. The algorithm is executed by the central computer system and is executed periodically, e.g., daily, weekly, etc., to query the database to confirm that individuals expected to leave the united states on that day have indeed left.
Travelers, especially business travelers, often change plans, requiring more time to stay. Typically, the traveler makes changes and the transportation business is similarly affected. The system requires that when such a change occurs in a foreign traveler, the airline sends an electronic notice to the main passport system to cause an update to the traveler database.
Further embodiments of the present invention enable seamless communication with proprietary data networks such as banks, credit card companies, car rental companies, cellular telephone companies, and the like, suitable for electronic computerized inspection of personnel in the united states. For example, a suspicious individual may be identified by the person's entry point in the united states and subsequent business transactions, car rentals, airline ticketing, and the like. This allows authorities to quickly track the movement of individuals in the united states to identify suspect or unequivocal individuals.
The smart passport system provided by the present invention may be implemented in stages. The first stage may be to incorporate RF signaling means in the card. This may allow the immigration authority to immediately track individuals and alert immigration officials when travelers do not leave on schedule. The signaling device may be mounted on the passport using a non-removable sticker in place of the stamp currently used in this country. The sticker may contain an RF signal device.
The second stage may be the implementation of a smart passport in other countries. This would replace all current passports with smart passports that can use a signaling device and have a digital photograph and a biometric fingerprint. This conversion can be implemented over a longer period of time to reduce costs and correct problems found in the implementation.
As mentioned above, the present invention also has an impact on the credit card industry. Credit card misuse and fraud have become a serious problem in this country, as is well known, with losses due to fraudulent purchases amounting to approximately $ 25 million each year.
A system and method for cargo tracking and security tracking within an organization is also disclosed and claimed in the above-referenced companion application filed concurrently herewith and owned by the assignee of the present invention. The system and method of the present invention may be kept consistent with these other systems to provide full spectrum security of personnel, goods, and institutions throughout the united states.
The smart passport, when associated with a american person, would contain the above listed information as well as other identification information, such as a fingerprint. The smart passport ID card may be issued to a parent of a neonate and data regarding the neonate is entered into a master database. Such data may include name, date of birth, hospital, parent name and address, social security number, and any other identifying information. Similarly, the ID card may be updated to include the name and address of the school that the individual entered. University records, graduation dates, and other school information may also be included in the card database. As the individual grows and begins a new cause, the relevant information can be updated. For example, when the individual obtains a driver's license, attends military service, obtains gun-holding clearance, etc., all of this information may be updated, or the representation on the card updated, or at least returned to the system master database.
Referring to fig. 6-15, the operation of the system of the present invention is illustrated by different algorithms. The operation of an identification system includes different stages, where different functions are performed, the sum of which functions is used to determine the identity of a person. With particular reference to FIG. 6, the process of a person traveling into an airport or checkpoint such as a border station is described. The traveler has been provided with an electronic identification ("smart ID") using electronic storage technology such as a "smart card" or similar device. The smart ID card is issued for use as a passport and contains similar information stored electronically as contained in ordinary passports. The smart ID further includes: one or more electronically readable but non-erasable digital photographs; a biometric fingerprint stored in an electronically readable but non-erasable manner; other biometric data (e.g., retinal scan data); signal devices (e.g., RF) having transmitting and receiving capabilities and similar transmitting/receiving devices; and the same data storage and transmission means known in the art. The smart ID is issued in a non-erasable manner (unless authorized by the user) and can be checked for tampering. Known techniques for tamper resistance include holographic printing and encoding. The RF signal means is designed to communicate with read/write devices located at border terminals operated by authorized personnel.
Ideally, all countries issue intelligent IDs consistent with this. Without this being the case, travelers need to stay at checkpoints and borders when entering a country where the invention is used, while having to build smart IDs and basic information descriptions. A traveler entering an airport checkpoint with a smart ID will initiate the check-in process 50. In the enrollment process 50, the traveler enrolls in an enrollment step 52 and provides a biometric fingerprint (preferably by scanning his card) in a fingerprinting step 54. The traveler may also or additionally submit a face recognition test at a face scanning step 56. At a checking step 58, the data acquired at the checkpoint ("real-time data") is compared with the data of the corresponding aviation database and/or with data entered at the place where the smart card was issued and with the corresponding data contained in the smart ID storage area. The data is validated at a validation step 60. In addition, the face recognition data is compared to other data entered by other means or linked to other networks, such as a list of people known to be at security risk, the data of which can be used to make the comparison. Such a comparison ensures that the traveler is indeed representative of his real identity. From the fingerprinting step 54, a query 62 is compared. From the face scan step 56, a query 64 makes additional comparisons. If the comparison indicates that the traveler belongs to the list of people to be detained, or the information does not match and counterfeiting is suspected, the system reading and comparing the data will automatically alert at step 66. The security agency can detain the traveler accordingly. If no such alarm is indicated, the process may continue at a continuation step 70 by performing various additional checks, if desired. Such additional checks include, but are not limited to, Intelligence monitoring by judicial agencies or other authorized government agencies (Intelligence watch).
At this point in the process, the smart ID downloaded at the checkpoint may be used to access data for airline ticketing and travel itineraries at an access step 72. This may be done if a government agency or other official agency desires to monitor the activities of the traveler, including whether the traveler leaves the country at the scheduled time and place indicated on the trip, at an access step 72. If not, an alarm may be automatically activated. At access step 72, the fingerprint data and other data are merged and assembled at assembly step 74.
Additionally, referring to FIG. 7, the smart ID may be linked to other databases (shown at 80) to analyze activities that may indicate illegal and threat conditions. Such databases 80 include, but are not limited to, a watch list 81, a social security (and employment history) database 82, a bank database 84, a car rental database 86, a phone usage database 88, a crime history database 89, a credit card usage database 90, a immigration visa database 91, a weapons purchase and registration database 92, a travel history 93, medical records 94, and the like.
Query 100 is executed and if any of the above comparisons indicate a programmed alarm event, the system automatically alerts the authorities and may withhold the traveler, at an alert step 102. Otherwise, the data is compiled at a compilation step 104, a threat/risk analysis step 106 may be performed, and a query 108 may be performed to check whether the traveler is at a threat or security risk. If the traveler is deemed to be at risk and threat, an alert step 102 is performed. Otherwise, the traveler may proceed to a security check step 110. The smart ID may be scanned by a metal checkpoint in a detection step 112, a biometric fingerprint acquired in a fingerprint scanning step 114, and a query 116 performed to confirm the identity of the traveler. If the identity of the traveler is not confirmed, the traveler is detained to alert the authorities at step 122. If the identity is valid, the traveler proceeds to a gate in a continue step 124. In a continuation step 124, the fingerprint and smart ID are rescanned and a query 126 is executed to determine if the ID is valid. If the ID is not valid, the traveler is detained and the officer alerted at step 122. If the ID is valid, the traveler boards the aircraft at a boarding step 128.
Referring to fig. 8, when a non-native citizen traveler leaves the country, the smart ID is scanned again at the departure point and the same verification steps described above are performed to prove the identity of the traveler. In a tracking step 130, the travel of foreign travelers is monitored and recorded. A query 132 is performed to determine whether the guest departs as planned and whether the guest has an approved travel itinerary and visa. The system compares the actual departure date with the filled-in travel itineraries entered at the time of entry. Other comparisons may also be performed, scanning activities such as banking, phone usage, credit card, rental, etc. that may be pieced together to reflect the traveler's activities and places of travel. If the comparison is normal, all monitored data is registered in a registration step 134. If any comparison yields a programmed discrepancy and indicates that an alarm should be raised, an alarm is automatically generated at an alarm step 136, thereby alerting authorities to detain the traveler before he leaves his or her home. A search for the traveler may then be initiated at search step 138. From the search step 138, a query 140 is executed to determine if there are any matches on the data sources that have been searched. If the comparisons are correct, the traveler is permitted to leave the country and the status of his identity is changed in the system to a non-monitoring mode.
When a citizen of this country returns from international travel, as shown in fig. 9, at an international checkpoint of departure, the traveler presents a smart ID to verify his identity through the biometric and digital face and fingerprint means described above. Query 150 is performed to determine if the traveler has a smart ID or similar device. If the traveler does not, his identity is manually verified in a verification step 152 and a picture of the traveler is taken, his digital picture and other data is stored on his card in a storage step 154 and a signaling device is applied (if available) in a signaling device application step 156. This reissues the updated passport at update step 158 and is issued to the traveler. If the traveler has a smart ID, the traveler is checked in a checking step 160. From the checking step 160 or from the updating step 158, a query 162 is performed to verify the identity of the traveler. If the identity cannot be verified, or if there is a discrepancy, the authority is alerted in an alert step 164. If no discrepancy exists and the traveler can be verified, the traveler is issued a boarding pass at a dispensing step 166. At boarding time, biometric scan data is again acquired (at scan step 168) for comparison again with the smart ID and seat number. The traveler then boards the airplane back into his country at a boarding step 170.
As shown in fig. 10, the system can be used for domestic travel where the traveler uses the smart ID and its stored biometric and other data to prove identity at the boarding point. Thus, the identification process described above is performed at step 180. If not performed according to this procedure, query 182 is performed to determine if the traveler has a smart ID or passport that may use an RF signal device. If the traveler has, the ID is scanned in a scanning step 184 before boarding the traveler. Also, biometric fingerprint data is also collected at this point. The identity of the traveler is verified at verification step 186 and a query 190 is performed to determine if the identity is valid. If the identity is valid, the traveler is allowed to board the aircraft at boarding step 192. If the identity is not valid, the individual is detained and the authority notified at alarm step 194. Any traveler without a smart ID can attach a microchip to their traditional passport.
Referring to fig. 11 and 12, the issuance and processing of travel visas to foreign visitors using similar techniques and methods will be described. Initially, the "Smart visa" information and data is compared to data stored in a database linked over a computer network between the country of the visitor and the country to which the visitor is traveling. The data is processed and stored at the local embassy via the network. In fig. 11, a first entry foreign visitor applies for entry into the united states through a U.S. embassy in the visitor's country at an application step 200. At a check step 202, the U.S. embassy coordinates with the country of residence for a background survey. Query 204 determines whether the background check meets an acceptable level of security. If it is determined that the guest does not meet the criteria for entry into the United states, the guest's entry application is rejected at a reject step 206 and his country is notified at a notification step 208. On the other hand, if it is determined that the guest meets the criteria for entry into the United states, the guest reports to the United states embassy to obtain his smart visa at an acquisition step 210. The query is completed in a meeting step 212 to clarify the guest's itinerary and U.S. contacts, and to collect relevant biometric data and photos. The smart visa is then compiled and issued to the guest at an issue step 214.
In fig. 12, the guest orders the available carrier's airline tickets at a ticket order step 220. The smart visa with the associated itinerary is submitted and if acceptable, the guest's visa is updated at an update step 222. A query 224 is then performed to determine if a visa is required for the current trip. If a visa is not required, the guest provides a smart visa and issues a ticket and registers the guest's itinerary in the system, at a registration step 226. If a visa is required, the guest applies for an updated visa at an application step 228. A query 230 is performed to determine whether the united states embassy approves the visa. If the visa has not been approved, the trip is denied and no ticket is issued at a denial step 232. If the visa has been approved, the visa is electronically issued, relevant information is registered and the guest is notified at an issue step 234. The guest provides a smart visa, issues his ticket, and registers the itinerary in the appropriate database, at a ticket purchase step 236.
The process of issuing a new "smart passport" or an update thereof to a local citizen (in this case, the U.S. citizen) is detailed in the flow chart of fig. 13. First, data and means for acquiring and storing the data similar to those described above with reference to the "smart ID" are implemented, and then the smart passport is used in place of the conventional passport. In this process, the traveler submits an application for review by the U.S. State Council at submission step 300. At a checking step 302, an appropriate background check is performed. Query 304 is then performed to determine whether the background check meets acceptable established criteria. If the acceptable established criteria are not met, the application is rejected at a reject step 306. If the background check meets acceptable established criteria, then the traveler is indicated at a notification step 310 that his smart passport is available at the designated department. The traveler then goes to the designated department where he takes a biometric fingerprint and photograph acquisition at step 312. The smart passport is assembled at assembly step 314 to include the relevant information and any sensing devices incorporated therein. The detection device information is linked to a database. The smart passport is then issued to the traveler in an issue step 316.
The flowchart of fig. 14 details the retrofitting of an existing passport with a microchip. The passport holder is required to add an RF signal device to his current passport at a policy change step 400. An option 402 may be presented to set whether to make such a change at the U.S. post office or at another designated location. After reporting to the designated location, step 404 is performed in which the passport holder is subjected to the acquisition of photographs and biometric fingerprints, stored in a database, and incorporated into the RF signal device. The RF signal device is then mounted as a stamp or sticker at a mounting step 406. Preferably, such a stamp or sticker is mounted so as to be non-removable from the passport. The signal means is then linked to a database record for the applicant (passport holder). At a re-issue step 408, the updated passport is issued to the passport holder.
FIG. 15 is a flow chart depicting a process for issuing a "national ID" in accordance with the present invention. The national ID is substantially the same as the smart ID described above and may be issued to all citizens using a social security number as one of a number of identifiers. Additional identifiers include digital biometric data such as fingerprints, face recognition, etc. In the issuance of the national ID, a query 500 is performed to ascertain whether the individual has a social security number. If the person does not have a social security number, an issuing step 502 is performed in which the social security number on the ID card with the RF signaling device is issued. The person's biometric fingerprint is then captured at a fingerprinting step 504, the fingerprint and social security number are then stored in the RF signal device at a storing step 506, and the card is then issued as a national ID card at an issuing step 508. In addition to the fingerprinting step 504, a photograph of the person may also be taken at a photographing step 514. The photos may be updated periodically, e.g., every five years (more frequent updates may be made to the child), at an update step 516. If the individual has a social security number, the national ID is combined with the smart passport at a combining step 510. Furthermore, all U.S. citizens can be scheduled to obtain a new country ID in a scheduling step 512, which includes biometric fingerprint and social security number data in the RF signaling device. In any case, when at least the relevant information is obtained, the country ID is issued in an issue step 518.
While the invention has been shown and described with reference to a detailed embodiment thereof, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention. For example, "individual" as used herein may be defined to include anything with a unique identification in addition to a person. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed in detail above, but that the invention will include all embodiments falling within the scope of the appended claims.
Claims (17)
1. An apparatus for providing secure and unique identification, the identification apparatus comprising:
means for receiving an electromagnetic data signal, said signal having a plurality of encoded segments corresponding to selected identification parameter values;
means for electromagnetically storing said data signal in a respective one of a plurality of data fields, said data fields including an identifier field adapted to receive a signal uniquely identifying an individual and a travel field adapted to receive a signal corresponding to parametric data relating to movement of said individual from a first location to a second location.
2. The device of claim 1, wherein the identifier field comprises a base alphanumeric field for recording alphanumeric data corresponding to the alphanumeric identifier data and a biometric field for recording information corresponding to the biometric identifier data.
3. The apparatus of claim 1, wherein the travel-related field further comprises: a secure passport field for receiving a signal corresponding to government passport data; and a readable and writable travel field adapted to receive a signal identifying the arrival of an individual at a particular geographic location.
4. The device of claim 2, wherein the basic alphanumeric field is adapted to receive a signal corresponding to the name, address, and government issued identification data of the individual.
5. The apparatus of claim 2, wherein the biometric field is adapted to receive a signal corresponding to a fingerprint of an individual.
6. The apparatus of claim 1, wherein the travel field is adapted to receive signals corresponding to a date and port of entry into a country and a date and port of exit from a country.
7. A system for tracking and identifying individuals, the system comprising:
an electromagnetic identification device having a plurality of data fields, each of said data fields being adapted to receive a signal uniquely identifying an individual;
a writer for encoding said identification signal into said electromagnetic identification device data field;
a controller for receiving a signal encoded on said electromagnetic identification device for uniquely identifying an individual and storing said individual identification signal in a master database storage device; and
a reader adapted to interrogate the unique individual identification signals stored on the electromagnetic identification devices and to communicate with the controller to compare the corresponding individual identification signals stored on the master database storage device with the signals received from the electromagnetic identification devices and to generate an alarm signal when the comparison indicates a difference.
8. The system of claim 7, wherein the writer further comprises means for selecting a writable data field of the electromagnetic identification device and recording only signals therein.
9. The system of claim 7, wherein the electromagnetic identification device further comprises a plurality of distinct fields, each of which is adapted to receive signals corresponding to alphanumeric identification data, biometric identification data, passport data, and data indicative of the entry and exit of the individual into and out of a country.
10. The system of claim 7, wherein the writer further comprises means for adding data in the alphanumeric field.
11. The system of claim 7 wherein the controller further comprises means for examining the contents of stored signals representing individuals scheduled to exit the port on a selected date and, after the selected date, comparing the signals with signals corresponding to actual recorded individuals who are to exit the exit port on the selected date and, when a discrepancy is found between an individual scheduled to exit the port and a recorded individual exiting the port, generating an alarm signal therefrom.
12. The system of claim 7 wherein the controller further comprises means for receiving sets of identification signals from a reader located at a selected port, the received reader signals corresponding to individuals entering the port for a selected period of time and the signals corresponding to individuals exiting the port for a selected period of time.
13. The system of claim 7, further comprising an electromagnetic read-write device adapted to communicate with a plurality of electromagnetic identification devices corresponding to a particular group of individuals;
the read-write equipment comprises a device for inquiring data fields on the electromagnetic identity recognition equipment and recording signals for recognizing each individual; and
apparatus for forwarding said recorded individual signals on said master database storage device comprising a writing device for encoding data and signals corresponding to the date and port on an electromagnetic identification device for each individual exiting the port.
14. The electromagnetic identification apparatus of claim 7 further comprising a data field accessible by a non-governmental entity.
15. The system of claim 1, wherein the electromagnetic identification device comprises an RFID tag.
16. The system of claim 15, wherein the RFID tag is an active tag having a range of up to 13 feet and operates at approximately 915 MHz.
17. The system of claim 7, wherein the reader comprises an Intermec IP3 portable reader platform.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US60/479,127 | 2003-06-17 | ||
| US10/871,267 | 2004-06-17 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK1094490A true HK1094490A (en) | 2007-03-30 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR100805501B1 (en) | Electronic security system for monitoring and recording activity and data relating to persons | |
| CN1833397A (en) | Electronic security systems for monitoring and recording human-related activities and data | |
| US20090266882A1 (en) | Smart passport system for monitoring and recording activity and data relating to persons | |
| US7494060B2 (en) | Information-based access control system for sea port terminals | |
| US20250166441A1 (en) | Identification scan in compliance with jurisdictional or other rules | |
| EP1470526B1 (en) | System and method of reading a security clearance card | |
| US8185747B2 (en) | Methods of registration for programs using verification processes with biometrics for fraud management and enhanced security protection | |
| US7161465B2 (en) | Enhancing security for facilities and authorizing providers | |
| US20080174100A1 (en) | Real time privilege management | |
| JP2005513639A (en) | Form and owner verification system | |
| CA2741966A1 (en) | System and method of integrated national citizen identity management and e-governance | |
| US20110145147A1 (en) | System and method for authorizing transactions | |
| Dempsey | Privacy issues with the use of smart cards | |
| US20080168062A1 (en) | Real Time Privilege Management | |
| US20070025600A1 (en) | Printer with fingerprint identification function | |
| HK1094490A (en) | Electronic security system for monitoring and recording activity and data relating to persons | |
| Nelson | Access control and biometrics | |
| Gopi et al. | E-RTO management system and vehicle authentication using RFID | |
| Ngara et al. | Database duplicity in Nigeria: a quest for legislative action towards data harmonization policy | |
| Okumoku-Evroro | Database Duplicity in Nigeria: Any Hope for Harmonization | |
| Gilbert | Digital Footprints: The Use of RFID Technology for General Law Enforcement |