WO2007025228A2 - Biometric security for law enforcement - Google Patents

Biometric security for law enforcement Download PDF

Info

Publication number
WO2007025228A2
WO2007025228A2 PCT/US2006/033394 US2006033394W WO2007025228A2 WO 2007025228 A2 WO2007025228 A2 WO 2007025228A2 US 2006033394 W US2006033394 W US 2006033394W WO 2007025228 A2 WO2007025228 A2 WO 2007025228A2
Authority
WO
WIPO (PCT)
Prior art keywords
data
notice
individual
format
source
Prior art date
Application number
PCT/US2006/033394
Other languages
French (fr)
Other versions
WO2007025228A3 (en
Inventor
Jose Herrero
Original Assignee
Tele-Guia Talking Yellow Pages, Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tele-Guia Talking Yellow Pages, Inc filed Critical Tele-Guia Talking Yellow Pages, Inc
Publication of WO2007025228A2 publication Critical patent/WO2007025228A2/en
Publication of WO2007025228A3 publication Critical patent/WO2007025228A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present invention relates to a system for managing data related to individuals or groups of associated individuals. More particularly, the present invention relates to a system for accessing diverse data sources to receive, capture, analyze, compare, manage and annotate different information data including biometric data, and convert the same into a readily accessed format store-able within a storage and retrieval system and for identifying action notices related thereto and transmitting the action notices to action parties, for example law enforcement parties, for taking further action.
  • PSTN Switched Telephone Network
  • security voiceprint access control systems use discriminating characteristics of a voice to ascertain whether a user is authorized to access a protected resource.
  • the sound of a speaker's voice is influenced by, among other things, the speaker's physical characters, including such physical articulators as the tongue, vocal tract size, nasal cavity, vocal cord development, breathing and breadth development; and speech production manner, such as pace and rate of articulation.
  • a typical voiceprint system samples a timed utterance produced by the user (a required phrase for example "I am John Smith"), records the same, and then compares the voiceprint of the utterance to a previously stored voiceprint of the authorized person speaking the required phrase, whom the user purports to be. While this system has recognized benefits and limitations, it fails to provide for adaptation to identify those outside its dedicated and singular memory. To be precise, such systems are bounded and rigid, able to operate only upon the basis of a direct input, previously recorded and same-type voice print. The use of biometric data, specifically voice print profiles and other data, is appreciated for use in risk management related to financial operations by Lawrence et al., US 2004/0024694 Al, entitled Biometric Risk Management, the contents of which are herein incorporated by reference.
  • Lawrence determines a customer s name, biometric data, and action data to access whether or not to complete a financial transaction based upon a correct identification and cross-reference of the individual.
  • Buinevicius et al. US 2004/0093349 Al, noted above, provides a system and method for capturing, analyzing, managing, and accessing disparate types and sources of media, biometric, and data base information to build a unified and intelligent time- based view of identified individuals regardless of data source or information type.
  • This system requires the processing of multi-modal information to extract, analyze, and sort through a large volume of digital information to identify an individual.
  • Information access points include video recognition, finger print reading, signature analysis, physical characteristics, retinal scans, a computer-linked microphone, and others.
  • Recorded information is entered in a database, for example a customers access point data base, and used by the database manager (for example the Department of Homeland Security (DHS)) to record initial and limited information about an individual (for example a thumb print and facial characteristics), and rapidly compare search a pre-created database to authorize or deny access to the country.
  • a database for example a customers access point data base
  • the database manager for example the Department of Homeland Security (DHS)
  • DHS Department of Homeland Security
  • a voice identification system involves generating and storing voice clips (voice data files) linked with a network address and voice authentication enables an "authenticated" voice message.
  • a very simple Interactive Voice (IV) Response type system is employed to receive a message, store a message, authenticate a voice profile, and determine a level of authentication and or request.
  • Finnigan creates a voice print file through a voice recognition unit governed by a simplified administration service requiring human intervention and management.
  • an integrated system and method capable of recognizing and capturing the voice of a caller (for example a terrorist or other person of interest) via hereinafter an Interactive Voice Recognition (IVR) system; recording and storing a voice element or sample of the caller as a voiceprint; comparing the voiceprint to a database of identified voiceprint recordings; and identifying and forwarding the caller's location and other stored information to the appropriate law enforcement agencies through an appropriate management determination.
  • IVR Interactive Voice Recognition
  • An important potential use for such a system includes detecting and tracking potential non-friendly individuals or other type of national or security enemies. Accordingly, a need exists for a nation-wide or selected region security and surveillance system that captures, analyzes, and manages information associated with potential threats to homeland security.
  • a system and method having the steps of capturing the voice of a caller suspected of being a terrorist or other person of interest; recording the voice of said caller; generating a digital voice print of the caller; storing the digital voice print in a database; recognizing the voice of said caller using said digital voice print; and forwarding the caller's location and other stored information to law enforcement agencies.
  • Fig 1 is a schematic view of a embodiment of the voice identifier and locator system according to the present invention.
  • a voice based anti-terrorism system 10 for identifying and locating a caller, person of interest, or known terror suspect.
  • Voice anti-terrorism system 10 preferably is a system for and method of capturing the voice of a caller suspected of being a terrorist or other person of interest.
  • the method of voice anti-terrorist system 10 generally requires the following steps: monitoring and recording the voice of a caller and generating a location designation for the caller (for example via ANI/ ALI use, as will be discussed); generating a digital voice print of the caller; storing the digital voice print in a database; recognizing the voice of the caller using the digital voice print; and forwarding the caller's location and other stored information to law enforcement agencies.
  • Voice anti-terrorism system 10 may have additional steps and adaptations as will be discussed.
  • a first step of anti-terrorist system 10 requires capturing a caller's voice from a multi source 1 of transmitted information.
  • the caller's voice may be captured and recorded via any call made from a mobile phone or wired land line of any type.
  • multi source 1 is not limited to the technologies shown.
  • Multi source 1 represents all the operative methods a caller or user may employ, for example to place a call or otherwise to transmit their voice.
  • additional call-origination and transmission technology may expand the possible multi source call origination nexus.
  • Other types of multi sources include the use of private information systems (for example ON-STARTM, AM/FM band radio, RF band usage both within FCC control and those short-wave sources, etc.
  • a phone card may be purchased by a known person of interest and each time of use, a recording occurs.
  • an origination point 2 is determined for accessing system 10.
  • an origination point for accessing a normal public switched telephone system may be a public phone booth linked to a central office (CO) and a class 4 or class 5 switches.
  • an origination point may be a foreign telephone call bounced from a satellite accessing a central office (CO) in the US for later connection to a domestic user.
  • Origination point 2 serves the conceptual purpose of narrowing multi source 1 originations into a single portal to access system 10, but it should be recognized, that system 10 may include multiple origination points 2 spread throughout a designated geographic region (a block, town, city, etc.), and my even extend throughout a designated telephone or telecommunication system (for example, the integrated telcon system in the western U.S.).
  • a designated geographic region a block, town, city, etc.
  • a designated telephone or telecommunication system for example, the integrated telcon system in the western U.S.
  • a amount of data is generated at data step 3, typically represented by the entire telephone call, and all associated information accessible to the respective telecommunication system involved; including for example, the satellite designation, the WiFi tower employed, a modem source, etc.
  • data step 3 may also include a step of capturing media, biometric, and other information associated with the caller, beyond a normal amount captured by a the telecommunication systems to enable operation, upon instructions from a support system 11 following a caller of interest and authorizing the capturing of additional information.
  • an important step of the present invention is to access at least a number identifier or location identifier represented by PSTN/Other step 4.
  • PSTN Public Switched Telephone Network
  • FDDI Fiber Distributed Data Interface
  • PSTN/Other step 4 requires a capacity to ultimately locate one of a numeric identifier or location identifier to an origination multi source
  • adaptive technologies may span beyond the bounds of a traditional PSTN network and provide the same information in an adaptive manner, for example the use of VpiP (Voice over internet protocol) transmits in data packets distributed randomly, but upon designation of an voice of interest by an authorized party the user source of the VoiP call is tracked by accessing a VoiP supplier's data base to determine the user for later watching and recordation.
  • VpiP Voice over internet protocol
  • ANI Automatic Number Identifier.
  • ALI Automatic Location Identifier
  • Substantial internet controlled telephony systems such as VoiP and an ATM (asynchronous transfer mode) packet switched telephony system are fully discussed and disclosed in the following references, and the entire contents of each are incorporated herein by reference.
  • VoiP asynchronous transfer mode
  • ATM asynchronous transfer mode
  • a step 5 of employing an Interactive Voice Recognition (IVR) system includes at least the steps of ; recording and storing a voice element or sample of the caller as a voiceprint transmitted over an incoming source line 5A; comparing the voiceprint to a database of identified voiceprint recordings; and identifying and forwarding the caller's location and other stored and available information (ANI/ ALI, multi source origination, call length or other data) and determining whether or not to send the identified information to a further step as a stored electronic file. While step 5 is so described, nothing herein shall limit the scope of step 5, wherein non IVR identification systems may be incorporated, such as the use of a photo-recognition system or a face recognition program.
  • IVR Interactive Voice Recognition
  • IVR/System determines that additional information is useful to link to a recorded voice print and is available from a PSTN/Other system 4, for example, original multi source information from the PSTN, mobile phones etc
  • the rVR/System via conduit 5B enables a backward query to determine additional information.
  • IVR System step 5 may be substantially complex, but as discussed more fully below, may integrate with a managed connection system 6 enabling substantial further access to various distribution networks 7 via communication paths 6A, 6B or to further support systems 11 for additional analysis.
  • the original PSTN/Other signal 4 is transported via managed connections 6 to the appropriate local, here one or more law enforcement agencies through an appropriate management determination method.
  • adaptively IVR System 5, and support system 11 may contain the tools for storing the digital voice print in a database, and may include a database and programming guidelines to store, track and identify suspect voiceprints, allowing system 10 to store digital voice prints for use and comparison with future incoming calls.
  • an additional communication path joins support system 11 with managed connections 6 to provide a fully supported communications loop.
  • support system 11 requests, additional communication and request paths HA, HB exist for retrieving additional information related to the PSTN/Other system and or requesting further information relating to a call origination.
  • a typical, though not preferred storage database has a processing system as disclosed herein may include one or more central processing units (CPUs) and storage devices coupled to the CPU and having stored there information for configuring the CPU.
  • CPUs central processing units
  • a designated CPU may be configured to capture media, biometric, and database information associated with an individual; process the media, biometric, and database information to extract, analyze and sort through digital information associated with a number of individuals; and provides an external user interface that can be configured to retrieve, view, manage, compare, and annotate the captured information and analysis.
  • a computer system not shown, but incorporated within system 10 is used as a central processing unit (CPU) that executes sequences of instructions contained in memory (volatile or non-volatile).
  • the instructions may be loaded into a random access memory (RAM) for execution by the CPU from a readonly memory (ROM), a mass storage device, or some other persistent storage.
  • RAM random access memory
  • ROM readonly memory
  • mass storage device or some other persistent storage.
  • hardwired circuitry may be used in place of, or in combination with, software instructions to implement the functions described.
  • the embodiments described herein are not limited to any specific combination of hardware circuitry and software, or to any particular source for the instructions executed by the computer system.
  • a further step of anti-terrorist system 10 requires comparing and analyzing a caller's voice print with the digital voice print database using the voice recognition system to identify a previous recorded voiceprint. This step may also include processing additional stored media (video etc.), biometric, and database information to extract, analyze and sort through digital information associated with a number of individuals; and providing a user interface that can be configured to retrieve, view, manage, compare, and annotate the captured information and analysis for later distribution.
  • this step may include the capacity to designate an individual as a suspected terrorist, insert into a data base on the IVR System 5, support system 11, or elsewhere a number of pre-recorded voice samples, preferred geographical and call source identifiers for use in readying system 10 to recognize an individual of interest.
  • This pre-designated and stored information also enables the crating of a continuous source profile or data set for an individual of interest and the convenient transmission of the same to a designated unit within distribution system 7 upon identification. For example, upon system lO's identification of a suspected terrorist, an entire file or selected parts of a data file may be transmitted via managed connectors 6 to elements within distribution list 7. Elements within distribution list 7 may be obviously supported by further voice print or other biometric or computer and statistical analysis methods.
  • an indexing and analysis function of anti-terrorist system 10 may adaptively include a system and method described in U.S. Pat. No. 5,835,667 entitled Method And Apparatus For Creating A Searchable Digital Video Library And
  • indexing and analysis systems take one factor or mode, such as, voice (e.g., a captured sound bite), face (e.g., a photograph), face/voice (e.g., a video clip), retina, and a fingerprint and attempts to match the multiple factors with the same factor for millions of individuals.
  • voice e.g., a captured sound bite
  • face e.g., a photograph
  • face/voice e.g., a video clip
  • retina e.g., a fingerprint
  • an additional step of anti-terrorist system 10 requires forwarding the number and location of an identified caller of interest to law enforcement agencies via PSTN or other connectors 6, preferably in real time while the call is in process.
  • Non-limiting examples of law enforcement agencies may include, for example, local police, anti-terrorism squads, hiterpol, the Central Intelligence Agency, the Federal Bureau of Investigation, etc. and other distribution sources for later storage and analysis of the data transmitted from the IVR System 5 or from support system 11. Where additionally required, those among the distribution list may request and employ further analysis 8, including higher technology methods of voice print, biometric, video, and medical methods for analysis beyond the reach of those normally provided to distribution list members. This optional later step of analysis allows rapid, but not real-time, feed back to support system 10.
  • One adaptive feature of the present invention allows location and number information via IVR System 5, and optionally more complete files and analysis via Support System 11 to be forwarded to law enforcement agencies simultaneously.
  • Via Support system 11 in conjunction with a location and identification support module 12, may also transfer a previously assembled complete caller profile which may include, in addition to the voiceprint, photo identification, physical features, pertinent agency notices, danger workings, known equipment locations, previously identified ANUALl information, known associates, biometrics and voice data print information stored in the database, psychological profiles, and likely confrontation reaction scenarios to law enforcement agencies.
  • managed connectors 6 and distribution system 7 may allow rapid transport of predetermined suspect files and filtered information to members on a distribution list.
  • a suspected terrorist operates a wired phone via one of the multi source communication paths 1 to original a call and generate data to the PSTN/Other system.
  • the suspected caller's voice is identified via IVR system and matched with a previous voice print and other optional biometric information stored in system 10 in the optional locations noted.
  • system 10 matches the caller's ANI/ALI information with known suspect information and forwards the total file via managed connectors 6 to a desired distribution list 7.
  • a local police service may initiate a public transportation delay and lock down local schools.
  • an anti terrorism taskforce may initiate operations and contact an Agency (CIA/FBI) or Interpol source for support and bring undercover personnel onsite to initiate suspect delay tactics (for example, a minor traffic accident) while allowing a specific capture task force sub unit to arrive at the local to set up a perimeter and become familiar with a specific suspect capture zone (a building for example).
  • CIA/FBI Agency
  • Interpol source for support and bring undercover personnel onsite to initiate suspect delay tactics (for example, a minor traffic accident) while allowing a specific capture task force sub unit to arrive at the local to set up a perimeter and become familiar with a specific suspect capture zone (a building for example).
  • the entire practice and operation of system 10 may allow for both minimizing public civilian risk, identifying and tracking (and optionally capturing) a suspected terrorist, while also minimizing law enforcement risk and detrimental impact to ongoing suspect investigations.
  • anti-terrorist system 10 may obtain information to track the caller location through diverse computer analysis mechanisms, including obtaining information through back-channel analysis of VOIP transport media, a wireless system such as a mobile phone, or other suitable means to identify a specific caller, a specific caller source, or a specific caller region/local for later monitoring.
  • system 10 enables recognition of a caller by his voice, biometrics (palm print, iris scan, finger prints, and other biometrics) and DNA by searching for a profile match in the database, where those features are linked with system 10. For example, when a suspect is located, the suspect's projected actions (walking to a public telephone booth with an external video camera) may be incorporated into system 10 to allow biometric tracking via selected video monitoring and suspect identification software. Upon identification via a selected biometric, an alert may then be forwarded via system 10, together with the profile of the identified caller operator, including biometrics such as finger, palm, eye recognition or DNA or blood information, or any other biometric information, to law enforcement agencies. In another alternate embodiment, system may send an image or any other identifying data to law enforcement agencies together with specific capture instructions based on a known risk assessment.
  • system 10 may be adapted to obtain information through any communication medium.
  • the system may also include automated computer controlled programs or "macros" that call out and position various support personnel upon identification of a terrorist suspect caller. Examples of such programs may include preset response and notification plans and recommended actions as suggested above.
  • data source or source(s) should be interpreted broadly and may include but is not limited to those data sources existing as officially recognized government data sources on a national, state, or local level (for example, NSA, CIA, FBI, DEA, EPA, FAA, and state and local police and government constructs, etc.) and those data sources of both a non- officially recognized governmental and a recognized civilian nature (for example, secret government agencies, private and para-military sources and task forces at all levels, and civilian associations including credit reporting agencies, banks, investment houses, schools, colleges, research laboratories, etc.)
  • biometric or biometric data generally is to be interpreted broadly and may include but is note limited to data relating to an individual's face and head profile and shape, skin tattoo biometric data, speech intonation biometric data, retinal construction and color biometric data, dental construction, bite-profile, and teeth condition, bone positions and stance, walking gate, hand and foot shapes and defects, skin topography (including finger prints, toe and foot prints), muscle tone, and any other data associated with an individual including DNA, blood and chemical markers, tattoo's and piercing, etc., as well as an individuals common geographic travel patterns, spending and purchasing habits, etc.
  • biometric and non-biometric data and biometric and non-biometric data sources are phrases that should be interpreted broadly, and may include data and sources relating to an individuals professional affiliations, physical characteristics, gang and criminal affiliations, educational connections, social and religious connections, financial and funding connections, friendships, meeting and eating places, common purchasing connections, email-internet- and communication source connections, chat room connections, and much more.
  • warning notice may also be interchangeably considered an "action notice" and may represent a wide variety of notices electronically transmitted or otherwise (for example computer generated audio warnings via the PSTN) regarding an individual and may include forms of watch notices, criminal activity suspected notices, danger activity notices, suspicious activity notices, monitor notices to inform on activity, track notices to inform a monitor system of movement and transportation, an associates notice to watch and gather data on those associated with an individual of interest, and an acquire/arrest/capture notice indicating similar action is authorized, requested, directed, or ordered.
  • an action notice may also be routed through a government agency to authorize the phone company to record those calls (capturing a voice print) associated with the calling card and cross-linking them to a data processing system.
  • means- or step-plus-function clauses are intended to cover the structures described or suggested herein as performing the recited function and not only structural equivalents but also equivalent structures.
  • a nail, a screw, and a bolt may not be structural equivalents in that a nail relies entirely on friction between a wooden part and a cylindrical surface, a screw's helical surface positively engages the wooden part, and a bolt's head and nut compress opposite sides of at least one wooden part, in the environment of fastening wooden parts, a nail, a screw, and a bolt may be readily understood by those skilled in the art as equivalent structures.

Abstract

A system, method, and apparatus for receiving and managing diverse data sources, data base control, and individual information to aid law enforcement is provided, principally to aid law enforcement and minimize terrorism activities. The system provides a system and a method having the steps of capturing data, transforming data into a usable format, generating action notices and transmitting the same to parties of interest, thereby enabling additional action.

Description

SYSTEM, METHOD, AND APPARATUS FOR RECEIVING AND MANAGING DIVERSE DATA SOURCES, DATA BASE CONTROL, AND INDIVIDUAL INFORMATION TO AID LAW ENFORCEMENT
CROSS REFERENCETORELATED APPLICATIONS
This application claims priority from US Provisional Application Ser. No. 60/711,124 filed August 25, 2005; the contents of each are incorporated herein by reference. This application makes reference to Applicant's other filing, US Provisional
Application Ser. No. 60/711,123, filed August 25, 2005, the contents of which are incorporated herein fully by reference.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a system for managing data related to individuals or groups of associated individuals. More particularly, the present invention relates to a system for accessing diverse data sources to receive, capture, analyze, compare, manage and annotate different information data including biometric data, and convert the same into a readily accessed format store-able within a storage and retrieval system and for identifying action notices related thereto and transmitting the action notices to action parties, for example law enforcement parties, for taking further action.
2. Description of the Related Art Diverse systems for monitoring, capturing, and manipulating biometric data regarding individuals are at least initially known, and address interfacing with the US
Department of Homeland Security (DHS). See for example, US Pub. No.
2004/0093349 Al to Buinevicius et al, published May 13, 2004, the contents of which are fully incorporated herein by references.
Means for identifying the location of a caller to a Switched Telephone Network (PSTN) are well known. Identification of a caller's location through the Automatic Location Information (ALI) and Automatic Number Information (ANI) are used for emergency response systems in locals throughout the world.
Methods and means for capturing and comparing a voiceprint of an individual are also known, particularly in security and data access systems. For example, security voiceprint access control systems use discriminating characteristics of a voice to ascertain whether a user is authorized to access a protected resource. The sound of a speaker's voice is influenced by, among other things, the speaker's physical characters, including such physical articulators as the tongue, vocal tract size, nasal cavity, vocal cord development, breathing and breadth development; and speech production manner, such as pace and rate of articulation. During operation of a security voice print access control system, when a user attempts to access a protected resource (for example a computer network or access portal or door), a typical voiceprint system samples a timed utterance produced by the user (a required phrase for example "I am John Smith"), records the same, and then compares the voiceprint of the utterance to a previously stored voiceprint of the authorized person speaking the required phrase, whom the user purports to be. While this system has recognized benefits and limitations, it fails to provide for adaptation to identify those outside its dedicated and singular memory. To be precise, such systems are bounded and rigid, able to operate only upon the basis of a direct input, previously recorded and same-type voice print. The use of biometric data, specifically voice print profiles and other data, is appreciated for use in risk management related to financial operations by Lawrence et al., US 2004/0024694 Al, entitled Biometric Risk Management, the contents of which are herein incorporated by reference.
Lawrence appreciates that a wide variety of biometric data (voice print, photo, iris scan, finger prints) may be accumulated in a broad data base and cross referenced to an individual's action data including court record, employment history, criminal record, government association and terrorism association. Lawrence teaches the accumulation of a data base in relation to a specific financial transaction or Suspicious Activity Report "SAR" in relation to a financial transaction to both manage risk and create a risk assessment profile for those assessing whether or not to enable the transaction. Obviously, it is advantageous to a Financial Institution to determine whether or not a potential customer, employee, or other individual is identified on a list of restricted entities published by the Office of Foreign Access Control (OFAC), the Treasury Office, or other government or industrial organization. Engaging in business with such individuals may have financial, and civil or criminal repercussions. In one example, Lawrence determines a customer s name, biometric data, and action data to access whether or not to complete a financial transaction based upon a correct identification and cross-reference of the individual.
Buinevicius et al., US 2004/0093349 Al, noted above, provides a system and method for capturing, analyzing, managing, and accessing disparate types and sources of media, biometric, and data base information to build a unified and intelligent time- based view of identified individuals regardless of data source or information type. This system requires the processing of multi-modal information to extract, analyze, and sort through a large volume of digital information to identify an individual. Information access points include video recognition, finger print reading, signature analysis, physical characteristics, retinal scans, a computer-linked microphone, and others. Recorded information is entered in a database, for example a customers access point data base, and used by the database manager (for example the Department of Homeland Security (DHS)) to record initial and limited information about an individual (for example a thumb print and facial characteristics), and rapidly compare search a pre-created database to authorize or deny access to the country.
In Finnigan US 2004/0165702 Al, the contents of which are herein incorporated by reference, a voice identification system involves generating and storing voice clips (voice data files) linked with a network address and voice authentication enables an "authenticated" voice message. In Finnigan, a very simple Interactive Voice (IV) Response type system is employed to receive a message, store a message, authenticate a voice profile, and determine a level of authentication and or request. During the course of operation, Finnigan creates a voice print file through a voice recognition unit governed by a simplified administration service requiring human intervention and management.
What is not appreciated by the related art is an integrated system and method capable of recognizing and capturing the voice of a caller (for example a terrorist or other person of interest) via hereinafter an Interactive Voice Recognition (IVR) system; recording and storing a voice element or sample of the caller as a voiceprint; comparing the voiceprint to a database of identified voiceprint recordings; and identifying and forwarding the caller's location and other stored information to the appropriate law enforcement agencies through an appropriate management determination.
An important potential use for such a system includes detecting and tracking potential non-friendly individuals or other type of national or security enemies. Accordingly, a need exists for a nation-wide or selected region security and surveillance system that captures, analyzes, and manages information associated with potential threats to homeland security.
What the earlier references also fail to recognize is the vast array of potential information sources normally considered outside those common biometric sources of voice recognition, iris scan, finger print, and facial features, whether scrambled or not. These newly considered information sources should include ATM video and audio, transit system audio and video recordings, public banking and meeting video and other surveillance sources generative and operational since the events of 9-11 -01.
Further, there is a need for a multi-modal system for and method of capture, analysis, management, and access of disparate types and sources of media, biometric, and database information, as well as for analyzing the captured information in a more intelligent fashion, and managing the captured information and analysis for retrieval, viewing, managing, comparing, and annotating.
Finally, there is a need for an adaptive system, applicable to a defined geographic region (for example, a city or town surrounding an individuals location), that links with a larger multi-modal system enabling the above needs on an as-needed basis allowing law enforcement otherwise unable to pin-point-locate an individual of interest to directly locate the individuals location via the PSTN or other telecommunication infrastructure use.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a system and method for capturing the voice of a caller suspected of being a terrorist or other person of interest. It is also an object of the present invention to provide such a system and method for generating a digital voice print of the caller and storing the digital voice print in a database linked with an active management system.
It is another optional and alternative aspect of the present invention to provide a system and method for recognizing the voice of a caller using a stored digital voice print.
It is yet another optional and alternative aspect of the present invention to provide a system for recognizing the voice of said caller using said digital voice print.
It is a further object of the present invention to provide a system for forwarding the caller's location and other stored information to law enforcement agencies.
These and other objects and advantages of the present invention are achieved by a system and method having the steps of capturing the voice of a caller suspected of being a terrorist or other person of interest; recording the voice of said caller; generating a digital voice print of the caller; storing the digital voice print in a database; recognizing the voice of said caller using said digital voice print; and forwarding the caller's location and other stored information to law enforcement agencies.
Accordingly, there is a need for an improved system, method, and apparatus for receiving and managing diverse data sources, data base control, and individual information to aid law enforcement
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and still other objects and advantages of the present invention will be more apparent from the following detailed explanation of the preferred embodiments of the invention in connection with the accompanying drawings.
Fig 1 is a schematic view of a embodiment of the voice identifier and locator system according to the present invention.
DETAILED DESCRIPTION OF THE INVENTION
Reference will now be made in detail to several embodiments of the invention that are illustrated in the accompanying drawings. Wherever possible, same or similar reference numerals are used in the drawings and the description to refer to the same or like parts or steps. The drawings are in simplified form and are not to precise scale or shape. For purposes of convenience and clarity only, directional terms, such as top, bottom, up, down, over, above, and below may be used with respect to the drawings. These and similar directional terms should not be construed to limit the scope of the invention in any manner. Furthermore, the words "connect," "couple," and similar terms with their inflectional morphemes do not necessarily denote direct and immediate connections, but also include connections through mediate elements or devices.
Referring now to Fig 1, there is illustrated a voice based anti-terrorism system 10 for identifying and locating a caller, person of interest, or known terror suspect.
Voice anti-terrorism system 10 preferably is a system for and method of capturing the voice of a caller suspected of being a terrorist or other person of interest. The method of voice anti-terrorist system 10 generally requires the following steps: monitoring and recording the voice of a caller and generating a location designation for the caller (for example via ANI/ ALI use, as will be discussed); generating a digital voice print of the caller; storing the digital voice print in a database; recognizing the voice of the caller using the digital voice print; and forwarding the caller's location and other stored information to law enforcement agencies. Voice anti-terrorism system 10 may have additional steps and adaptations as will be discussed.
A first step of anti-terrorist system 10 requires capturing a caller's voice from a multi source 1 of transmitted information. For example, the caller's voice may be captured and recorded via any call made from a mobile phone or wired land line of any type. As modern-day calls may access satellite, VoiP, WiFi Max and other technology, those skilled in the art should recognize that multi source 1 is not limited to the technologies shown. Multi source 1 represents all the operative methods a caller or user may employ, for example to place a call or otherwise to transmit their voice. As technology improves and adapts to demand, additional call-origination and transmission technology may expand the possible multi source call origination nexus. Other types of multi sources include the use of private information systems (for example ON-STAR™, AM/FM band radio, RF band usage both within FCC control and those short-wave sources, etc.
In another example, a phone card may be purchased by a known person of interest and each time of use, a recording occurs.
Ultimately, through a variety of multi source 1 technologies, an origination point 2 is determined for accessing system 10. For example, an origination point for accessing a normal public switched telephone system (PSTN) may be a public phone booth linked to a central office (CO) and a class 4 or class 5 switches. Li other cases, an origination point may be a foreign telephone call bounced from a satellite accessing a central office (CO) in the US for later connection to a domestic user.
Origination point 2 serves the conceptual purpose of narrowing multi source 1 originations into a single portal to access system 10, but it should be recognized, that system 10 may include multiple origination points 2 spread throughout a designated geographic region (a block, town, city, etc.), and my even extend throughout a designated telephone or telecommunication system (for example, the integrated telcon system in the western U.S.).
Following the determination of an origination point 2, a amount of data is generated at data step 3, typically represented by the entire telephone call, and all associated information accessible to the respective telecommunication system involved; including for example, the satellite designation, the WiFi tower employed, a modem source, etc.
While not shown, data step 3 may also include a step of capturing media, biometric, and other information associated with the caller, beyond a normal amount captured by a the telecommunication systems to enable operation, upon instructions from a support system 11 following a caller of interest and authorizing the capturing of additional information.
During the origination of a telecommunications call, it is recognized that an important step of the present invention is to access at least a number identifier or location identifier represented by PSTN/Other step 4.
As noted above, the Public Switched Telephone Network (PSTN), which refers to the international telephone system based on copper wires carrying typically analog voice data is in contrast to newer telephone networks base on digital technologies, such as ISDN and FDDI. Telephone service carried by the PSTN is often called plain old telephone service (POTS). ISDN (Integrated Services Digital Network) is a system of digital telephone connections. ISDN allows multiple digital channels to be operated simultaneously through a single, standard interface. ISDN is adequate for videoconferencing and other high bandwidth applications. FDDI (Fiber Distributed Data Interface) represents a set of ANSI protocols for sending digital data over fiber optic cable. In sum, while PSTN/Other step 4 requires a capacity to ultimately locate one of a numeric identifier or location identifier to an origination multi source, it recognizes that adaptive technologies may span beyond the bounds of a traditional PSTN network and provide the same information in an adaptive manner, for example the use of VpiP (Voice over internet protocol) transmits in data packets distributed randomly, but upon designation of an voice of interest by an authorized party the user source of the VoiP call is tracked by accessing a VoiP supplier's data base to determine the user for later watching and recordation.
For example, while a PSTN system provides for the generation of an ANI (Automatic Number Identifier. - a feature in which a series of digits, either analog or digital, are included in the call, thus identifying the telephone number of the caller) and an ALI (Automatic Location Identifier) - both critical components of an emergency 911 type system - step 4 recognizes that a modern cellular telecommunication system recognizes the cellular tower receiving a call within a region and thereby provides a general "geographical" data source linked to a call.
Those skilled in the area of telecommunication will also recognize that steps 1-
4 may occur almost immediately and may be revealed in other sources within a larger single construct. For example, by placing an individual call from a land line, a telephone call from multi source 1, crafts an origination point 2, and includes data 3 recognized in a traditional PSTN input source 4 within milliseconds. The steps noted above have been separated for easier representation during discussion, but should be recognized as easily adaptive to a particular telecommunications environment originated by a suspect of interest, identified here as a suspected terrorist.
Substantial internet controlled telephony systems, such as VoiP and an ATM (asynchronous transfer mode) packet switched telephony system are fully discussed and disclosed in the following references, and the entire contents of each are incorporated herein by reference. US 6,487,200 to Fraser entitled Packet Telephone System. US 6,785,266 to Swartz entitled Internet Controlled Telephone System. US 6,445,694 to Swartz entitled Internet Controlled Telephone System.
A later step 4A continues the general call routing process via the technology in place ensuring there is no perceptible difference in a call to a suspected terrorist. As call processing continues, a step 5 of employing an Interactive Voice Recognition (IVR) system includes at least the steps of ; recording and storing a voice element or sample of the caller as a voiceprint transmitted over an incoming source line 5A; comparing the voiceprint to a database of identified voiceprint recordings; and identifying and forwarding the caller's location and other stored and available information (ANI/ ALI, multi source origination, call length or other data) and determining whether or not to send the identified information to a further step as a stored electronic file. While step 5 is so described, nothing herein shall limit the scope of step 5, wherein non IVR identification systems may be incorporated, such as the use of a photo-recognition system or a face recognition program.
During step 5, if IVR/System determines that additional information is useful to link to a recorded voice print and is available from a PSTN/Other system 4, for example, original multi source information from the PSTN, mobile phones etc, the rVR/System via conduit 5B enables a backward query to determine additional information. As a consequence, it should be recognized that IVR System step 5 may be substantially complex, but as discussed more fully below, may integrate with a managed connection system 6 enabling substantial further access to various distribution networks 7 via communication paths 6A, 6B or to further support systems 11 for additional analysis. Ultimately, based upon the information and initial determinations made by F/R/System 5, the original PSTN/Other signal 4 is transported via managed connections 6 to the appropriate local, here one or more law enforcement agencies through an appropriate management determination method.
It should be recognized, that adaptively IVR System 5, and support system 11 may contain the tools for storing the digital voice print in a database, and may include a database and programming guidelines to store, track and identify suspect voiceprints, allowing system 10 to store digital voice prints for use and comparison with future incoming calls. As a consequence, an additional communication path joins support system 11 with managed connections 6 to provide a fully supported communications loop. As is also disclosed herein, where support system 11 requests, additional communication and request paths HA, HB exist for retrieving additional information related to the PSTN/Other system and or requesting further information relating to a call origination.
A typical, though not preferred storage database has a processing system as disclosed herein may include one or more central processing units (CPUs) and storage devices coupled to the CPU and having stored there information for configuring the CPU. A designated CPU may be configured to capture media, biometric, and database information associated with an individual; process the media, biometric, and database information to extract, analyze and sort through digital information associated with a number of individuals; and provides an external user interface that can be configured to retrieve, view, manage, compare, and annotate the captured information and analysis.
In one embodiment, a computer system not shown, but incorporated within system 10 is used as a central processing unit (CPU) that executes sequences of instructions contained in memory (volatile or non-volatile). The instructions may be loaded into a random access memory (RAM) for execution by the CPU from a readonly memory (ROM), a mass storage device, or some other persistent storage. In other embodiments, hardwired circuitry may be used in place of, or in combination with, software instructions to implement the functions described. Thus, the embodiments described herein are not limited to any specific combination of hardware circuitry and software, or to any particular source for the instructions executed by the computer system.
A further step of anti-terrorist system 10 requires comparing and analyzing a caller's voice print with the digital voice print database using the voice recognition system to identify a previous recorded voiceprint. This step may also include processing additional stored media (video etc.), biometric, and database information to extract, analyze and sort through digital information associated with a number of individuals; and providing a user interface that can be configured to retrieve, view, manage, compare, and annotate the captured information and analysis for later distribution.
For example, this step may include the capacity to designate an individual as a suspected terrorist, insert into a data base on the IVR System 5, support system 11, or elsewhere a number of pre-recorded voice samples, preferred geographical and call source identifiers for use in readying system 10 to recognize an individual of interest.
This pre-designated and stored information also enables the crating of a continuous source profile or data set for an individual of interest and the convenient transmission of the same to a designated unit within distribution system 7 upon identification. For example, upon system lO's identification of a suspected terrorist, an entire file or selected parts of a data file may be transmitted via managed connectors 6 to elements within distribution list 7. Elements within distribution list 7 may be obviously supported by further voice print or other biometric or computer and statistical analysis methods.
As discussed herein, an indexing and analysis function of anti-terrorist system 10 may adaptively include a system and method described in U.S. Pat. No. 5,835,667 entitled Method And Apparatus For Creating A Searchable Digital Video Library And
A System And Method Of Using Such A Library, issued to Wactlar, et al. on Nov. 10,
1998 and incorporated in its entirety herein by reference.
Conventional indexing and analysis systems take one factor or mode, such as, voice (e.g., a captured sound bite), face (e.g., a photograph), face/voice (e.g., a video clip), retina, and a fingerprint and attempts to match the multiple factors with the same factor for millions of individuals.
As noted above, an additional step of anti-terrorist system 10 requires forwarding the number and location of an identified caller of interest to law enforcement agencies via PSTN or other connectors 6, preferably in real time while the call is in process.
Non-limiting examples of law enforcement agencies may include, for example, local police, anti-terrorism squads, hiterpol, the Central Intelligence Agency, the Federal Bureau of Investigation, etc. and other distribution sources for later storage and analysis of the data transmitted from the IVR System 5 or from support system 11. Where additionally required, those among the distribution list may request and employ further analysis 8, including higher technology methods of voice print, biometric, video, and medical methods for analysis beyond the reach of those normally provided to distribution list members. This optional later step of analysis allows rapid, but not real-time, feed back to support system 10.
One adaptive feature of the present invention allows location and number information via IVR System 5, and optionally more complete files and analysis via Support System 11 to be forwarded to law enforcement agencies simultaneously. Via Support system 11 , in conjunction with a location and identification support module 12, may also transfer a previously assembled complete caller profile which may include, in addition to the voiceprint, photo identification, physical features, pertinent agency notices, danger workings, known equipment locations, previously identified ANUALl information, known associates, biometrics and voice data print information stored in the database, psychological profiles, and likely confrontation reaction scenarios to law enforcement agencies.
As generally discussed above, managed connectors 6 and distribution system 7 may allow rapid transport of predetermined suspect files and filtered information to members on a distribution list.
In an operational example of the present invention, a suspected terrorist operates a wired phone via one of the multi source communication paths 1 to original a call and generate data to the PSTN/Other system. The suspected caller's voice is identified via IVR system and matched with a previous voice print and other optional biometric information stored in system 10 in the optional locations noted. Upon identification of a suspect, system 10 matches the caller's ANI/ALI information with known suspect information and forwards the total file via managed connectors 6 to a desired distribution list 7.
Upon receipt of the total file, which may include responsive orders, a local police service may initiate a public transportation delay and lock down local schools. Simultaneously, an anti terrorism taskforce may initiate operations and contact an Agency (CIA/FBI) or Interpol source for support and bring undercover personnel onsite to initiate suspect delay tactics (for example, a minor traffic accident) while allowing a specific capture task force sub unit to arrive at the local to set up a perimeter and become familiar with a specific suspect capture zone (a building for example). As a consequence, the entire practice and operation of system 10, may allow for both minimizing public civilian risk, identifying and tracking (and optionally capturing) a suspected terrorist, while also minimizing law enforcement risk and detrimental impact to ongoing suspect investigations.
It should be additionally recognized, that anti-terrorist system 10 may obtain information to track the caller location through diverse computer analysis mechanisms, including obtaining information through back-channel analysis of VOIP transport media, a wireless system such as a mobile phone, or other suitable means to identify a specific caller, a specific caller source, or a specific caller region/local for later monitoring.
In further summary of the above, in alternative embodiments of the present invention, system 10 enables recognition of a caller by his voice, biometrics (palm print, iris scan, finger prints, and other biometrics) and DNA by searching for a profile match in the database, where those features are linked with system 10. For example, when a suspect is located, the suspect's projected actions (walking to a public telephone booth with an external video camera) may be incorporated into system 10 to allow biometric tracking via selected video monitoring and suspect identification software. Upon identification via a selected biometric, an alert may then be forwarded via system 10, together with the profile of the identified caller operator, including biometrics such as finger, palm, eye recognition or DNA or blood information, or any other biometric information, to law enforcement agencies. In another alternate embodiment, system may send an image or any other identifying data to law enforcement agencies together with specific capture instructions based on a known risk assessment.
It should also be recognized, that system 10 may be adapted to obtain information through any communication medium. The system may also include automated computer controlled programs or "macros" that call out and position various support personnel upon identification of a terrorist suspect caller. Examples of such programs may include preset response and notification plans and recommended actions as suggested above.
Those of skill in the art should understand that as used herein the phrase data source or source(s) should be interpreted broadly and may include but is not limited to those data sources existing as officially recognized government data sources on a national, state, or local level (for example, NSA, CIA, FBI, DEA, EPA, FAA, and state and local police and government constructs, etc.) and those data sources of both a non- officially recognized governmental and a recognized civilian nature (for example, secret government agencies, private and para-military sources and task forces at all levels, and civilian associations including credit reporting agencies, banks, investment houses, schools, colleges, research laboratories, etc.)
Those of skill in the art should also understated that the phrase physical feature biometric or biometric data generally is to be interpreted broadly and may include but is note limited to data relating to an individual's face and head profile and shape, skin tattoo biometric data, speech intonation biometric data, retinal construction and color biometric data, dental construction, bite-profile, and teeth condition, bone positions and stance, walking gate, hand and foot shapes and defects, skin topography (including finger prints, toe and foot prints), muscle tone, and any other data associated with an individual including DNA, blood and chemical markers, tattoo's and piercing, etc., as well as an individuals common geographic travel patterns, spending and purchasing habits, etc.
Those of skill in the art should also recognize that biometric and non-biometric data and biometric and non-biometric data sources are phrases that should be interpreted broadly, and may include data and sources relating to an individuals professional affiliations, physical characteristics, gang and criminal affiliations, educational connections, social and religious connections, financial and funding connections, friendships, meeting and eating places, common purchasing connections, email-internet- and communication source connections, chat room connections, and much more.
Those of skill in the art should recognize that as use herein the phrase warning notice may also be interchangeably considered an "action notice" and may represent a wide variety of notices electronically transmitted or otherwise (for example computer generated audio warnings via the PSTN) regarding an individual and may include forms of watch notices, criminal activity suspected notices, danger activity notices, suspicious activity notices, monitor notices to inform on activity, track notices to inform a monitor system of movement and transportation, an associates notice to watch and gather data on those associated with an individual of interest, and an acquire/arrest/capture notice indicating similar action is authorized, requested, directed, or ordered. For example, when a phone card is purchased with a suspect's credit card a notice may be provided to a phone company to track the calls linked with the phone card and their locals. An action notice may also be routed through a government agency to authorize the phone company to record those calls (capturing a voice print) associated with the calling card and cross-linking them to a data processing system.
In any appended claims, means- or step-plus-function clauses are intended to cover the structures described or suggested herein as performing the recited function and not only structural equivalents but also equivalent structures. Thus, for example, although a nail, a screw, and a bolt may not be structural equivalents in that a nail relies entirely on friction between a wooden part and a cylindrical surface, a screw's helical surface positively engages the wooden part, and a bolt's head and nut compress opposite sides of at least one wooden part, in the environment of fastening wooden parts, a nail, a screw, and a bolt may be readily understood by those skilled in the art as equivalent structures.
The present invention has been described with particular reference to the preferred embodiments. It should be understood that the foregoing descriptions and examples are only illustrative of the present invention. Various alternatives and modifications thereof can be devised by those skilled in the art without departing from the spirit and scope of the present invention. Accordingly, the present invention is intended to embrace all such alternatives, modifications, and variations that fall within the scope of the appended claims.

Claims

WHAT IS CLAIMED IS
1. A data processing system, comprising: at least one data supply portal means for accessing a plurality of diverse data sources, including at least a first enforcement data source, and for receiving diverse data there from for storage in at least one associated data storage and manipulation and access system; said plurality of diverse data sources including at least one of a biometric data source containing biometric data associated with at least one individual and a non- biometric data source containing data associated with said at least one individual; said means for accessing further including means for determining a received format of a selected one from said plurality of diverse data sources stored in said at least one associated data storage and manipulation and access system; means for transforming said determined received format of said selected one of said plurality of diverse data sources to a preferably stored format and for storing said preferably stored format in said at least one data storage and manipulation and access system in said transformed format; said preferably stored format being a digital format for data accessible by said system in a least-time manner and cross-linked to said associated at least one individual; and said preferably stored format being stored in said least-time manner enabling a rapid access by said data processing system and a rapid update and cross correlation to other preferably stored formats transformed from others in said plurality of diverse data sources by said means for transforming.
2. A data processing system, according to claim 1 further comprising: means for managing said preferably stored format in said data storage and manipulation and access system; said means for managing including means for providing a user interface to perceive, manage, compare, and annotate said data for said individual stored in said preferably stored format and for associating related said data with a plurality of individuals; said means for managing further including means for designating and generating at least a first warning notice associated with at least one said individual; and said means for managing including means for distributing at least said first warning notice associated with said individual to at least one enforcement data source upon a predetermined instruction.
3. A data processing system, according to claim 2, wherein: said at least one enforcement data source is selected from a group consisting of a government source, a non-government source, a multi-access government source, and a multi-access non-governmental source, whereby said at least first warning notice may be distributed to effect at least one of a minimization of unlawful criminal activity in a variety of jurisdictions, an undesired civil activity, and a promotion and aid of a desired activity.
4. A data processing system, according to claim 2, wherein: said at least first warning notice is at least one of a group consisting of a watch notice, a criminal activity notice, a danger notice, a suspicious notice, a monitor notice, a track notice, an associates notice, an acquire/detain/arrest/capture notice, an individual authentication notice, a verified authorization notice, and an access authorization notice.
5. A data processing system, according to claim 3, wherein: said plurality of diverse data sources including at least one enforcement data source to receive and provide data in said received format including data from at least one of a group consisting of said biometric data and a non-biometric data associated with said at least one individual.
6. A data processing system, according to claim 3, wherein: said means for distributing said at least first warning notice further comprises: means for accessing at least one distribution system accessible to said first enforcement data source, and for publishing said at least first warning notice, whereby said first warning is received by said first enforcement data source in a manner capable of human and electronic perception.
7. A data processing system, according to claim 6, further comprising: means for said at least first enforcement data source to generate and send a data inquiry to said associated data storage and manipulation and access system in said data processing system to conduct at least one of an extraction, manipulation, retransmission, and distribution of data in one of said received format and said preferably stored format relating to an individual of interest.
8. A data processing system, according to claim 6, wherein: said means for accessing and publishing further comprises: means for pushing an informational verification notice to said first enforcement data source.
9. A data processing system, according to claim 2, further comprising: means for at least receiving a biometric verification data summary from said at one enforcement system, whereby said at least one enforcement system having responded to said at least first warning notice published to at least first enforcement data source and having accessed an individual of interest generates and transmit said biometric verification data summary to said data process system, and for conducting a biometric verification and transmitting biometric verification result corresponding to said individual of interest to said enforcement system.
10. A method of identifying and locating a caller comprising the steps of: identifying a first biometric identifier; securing at least a portion of said biometric identifier including a step of capturing a caller's voice; recording the voice of said caller; generating a digital voice print of the caller to be stored in a database; recognizing the voice of said caller using said digital voice print to access a caller's identity stored within said data base and run a comparison thereto; and forwarding the caller's location and identity to law enforcement agencies for later action.
11. A method for data processing, comprising the steps of: providing at least one data supply portal means for accessing a plurality of diverse data sources, including at least a first enforcement data source, and for receiving diverse data there from for storage in at least one associated data storage and manipulation and access system; providing in said plurality of diverse data sources at least one of a biometric data source containing biometric data associated with at least one individual and a non- biometric data source containing data associated with said at least one individual; providing in said means for accessing further means for determining a received format of a selected one from said- plurality of diverse data sources stored in said at least one associated data storage and manipulation and access system; providing means for transforming said determined received format of said selected one of said plurality of diverse data sources to a preferably stored format and for storing said preferably stored format in said at least one data storage and manipulation and access system in said transformed format; said preferably stored format being a digital format for data accessible by said system in a least-time manner and cross-linked to said associated at least one individual; and storing said preferably stored format in said least-time manner enabling a rapid access by said data processing system and a rapid update and cross correlation to other preferably stored formats transformed from others in said plurality of diverse data sources by said means for transforming.
12. A method for data processing, according to claim 11, further comprising the steps of: providing means for managing said preferably stored format in said data storage and manipulation and access system; said step of providing means for managing including a step of providing means for providing a user interface to perceive, manage, compare, and annotate said data for said individual stored in said preferably stored format and for associating related said data with a plurality of individuals; said step of providing said means for managing further including a step of providing means for designating and generating at least a first warning notice associated with at least one said individual; and said step of providing said means for managing further comprising the step of providing means for distributing at least said first warning notice associated with said individual to at least one enforcement data source upon a predetermined instruction.
13. A method for data processing, according to claim 12, wherein: said step of providing at least one enforcement data source includes a step of selecting from a group consisting of a government source, a non-government source, a multi-access government source, and a multi-access non-governmental source, whereby said at least first warning notice may be distributed to effect at least one of a minimization of unlawful criminal activity in a variety of jurisdictions, an undesired civil activity, and a promotion and aid of a desired activity.
14. A method for data processing, according to claim 12, wherein: said step of providing at least a first warning notice includes the step of selecting said step from at least one of a group consisting of a watch notice, a criminal activity notice, a danger notice, a suspicious notice, a monitor notice, a track notice, an associates notice, an acquire/detain/arrest/capture notice, an individual authentication notice, a verified authorization notice, and an access authorization notice.
15. A method for data processing, according to claim 13, wherein: said step of providing said plurality of diverse data sources further comprises the step of including at least one enforcement data source to receive and provide data in said received format including data from at least one of a group consisting of said biometric data and a non-biometric data associated with said at least one individual.
16. A method for data processing, according to claim 13, wherein: said step of providing means for distributing said at least first warning notice further comprises the step of: providing means for accessing at least one distribution system accessible to said first enforcement data source, and for publishing said at least first warning notice, whereby said first warning is received by said first enforcement data source in a manner capable of human and electronic perception.
PCT/US2006/033394 2005-08-25 2006-08-25 Biometric security for law enforcement WO2007025228A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US71112405P 2005-08-25 2005-08-25
US60/711,124 2005-08-25

Publications (2)

Publication Number Publication Date
WO2007025228A2 true WO2007025228A2 (en) 2007-03-01
WO2007025228A3 WO2007025228A3 (en) 2008-06-05

Family

ID=37772491

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/033394 WO2007025228A2 (en) 2005-08-25 2006-08-25 Biometric security for law enforcement

Country Status (1)

Country Link
WO (1) WO2007025228A2 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices
US6317834B1 (en) * 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6317834B1 (en) * 1999-01-29 2001-11-13 International Business Machines Corporation Biometric authentication system with encrypted models
US6256737B1 (en) * 1999-03-09 2001-07-03 Bionetrix Systems Corporation System, method and computer program product for allowing access to enterprise resources using biometric devices

Also Published As

Publication number Publication date
WO2007025228A3 (en) 2008-06-05

Similar Documents

Publication Publication Date Title
US10740861B1 (en) Systems and methods for acquiring, accessing, and analyzing investigative information
US8615214B2 (en) Method and system for using communication devices for retrieving personal medical data
US9876900B2 (en) Digital telecommunications call management and monitoring system
US8782421B2 (en) System and method for verification of personal identity
US7634063B2 (en) System and method for monitoring individuals
US8149994B2 (en) Electronic surveillance system in communication network and method thereof
US11153435B2 (en) Method and system for automatically blocking robocalls
US8406383B2 (en) Voice authentication for call control
WO2007025227A2 (en) Enhanced 911 system and method for operating the same
US20120099716A1 (en) System and Method for Call Treatment Using a Third Party Database
US20040153553A1 (en) System and method for use of mobile wireless devices for authentication of personal identification and registration with security network
US20030070076A1 (en) System and method for providing personal information about criminal offenders to a plurality of law enforcement agencies
US20170223181A1 (en) System and method for controlling free phone calls through an institutional phone system
US20040010698A1 (en) Digital certificate system incorporating voice biometric processing
WO2005076782A2 (en) Use of public switched telephone network for capturing electronic signatures in on-line transactions
US11483428B2 (en) Method and system for automatically detecting and blocking robocalls
US6937702B1 (en) Method, apparatus, and computer readable media for minimizing the risk of fraudulent access to call center resources
US6804331B1 (en) Method, apparatus, and computer readable media for minimizing the risk of fraudulent receipt of telephone calls
US7272565B2 (en) System and method for monitoring individuals
US10079933B2 (en) System and method for user-privacy-aware communication monitoring and analysis
WO2007025228A2 (en) Biometric security for law enforcement
WO2011146553A1 (en) Certified communications system and method
US6731733B2 (en) System and method protecting the identity of target telephone numbers from unauthorized access
CN111325646A (en) Method and device for opening account change certificate
US9003495B2 (en) Authorised data recording

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application
DPE2 Request for preliminary examination filed before expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 06813816

Country of ref document: EP

Kind code of ref document: A2