Tamper proof mobile tracking system
10524368 ยท 2019-12-31
Inventors
Cpc classification
G08B21/0286
PHYSICS
G06K19/07762
PHYSICS
H05K5/0208
ELECTRICITY
G08B21/0275
PHYSICS
International classification
G08B23/00
PHYSICS
G06K19/077
PHYSICS
Abstract
A tamper proof mobile tracking system that has a base unit that comprises of a base band transceiver, a GPS chip, a power supply, and a microprocessor that has an RFID interrogator. A locking unit, the locking unit comprises of a locking pin that powers an active RFID tag within the locking unit and that operatively connects to the base unit. A band, the band comprises of a active RFID tag and an embedded antenna that powers the active RFID tag when the base unit, the locking unit and the band are all operatively connected. And, a central unit that communicates with the base unit that tracks and detect faults associated with the base unit, the locking unit and the band when they are all operatively connected. The system is used by governmental entities to monitoring for the tampering of devices that are used by the system.
Claims
1. A tamper proof mobile tracking system, the system comprises: a base unit that comprises of a base band transceiver, a Global Positioning System chip, a power supply, and a microprocessor that has a Radio Frequency Identification Device interrogator, the base unit is placed around the ankle of a wearer; a locking unit, the locking unit comprises of a locking pin that is operatively connected to and that delivers an electrical current to an active Radio Frequency Identification Device tag that is within the locking unit, that is operatively connected to the base unit, after the base unit is placed on the wearer; a band, the band comprises of an active Radio Frequency Identification Device tag and an embedded antenna that is operatively connected and that delivers an electrical current to the active Radio Frequency Identification Device tag of the band when the base unit, the locking unit and the band are all operatively connected, the band attaches to the locking unit after the base unit and the locking unit are placed on the wearer; and a central unit that communicates with the base unit that tracks and detects a fault associated with the base unit, the locking unit and the band when they are all operatively connected, and a fault is defined to be the removal of the locking unit from the base unit or any interruption of a powered circuit that is created when the base unit, the locking unit and the band are all operatively connected.
2. The tamper proof mobile tracking system of claim 1, wherein the power supply of the base unit serves as a main power source for the base unit, the locking unit and the band, wherein the base band transceiver sends and receives an encrypted information from the central unit as to a status of the faults and connections and a programming between the base unit, the locking unit and the band, wherein the Global Positioning System chip serves to inform the central unit of a location of the base unit, and wherein the Radio Frequency Identification Device interrogator first receives a command from the central unit upon the base unit, the locking unit and the band all being operatively connected to program the active Radio Frequency Identification Device tag of the locking device and the active Radio Frequency Identification Device tag of the band with a unique code sequence that has a secret key and to monitor the connection between the locking unit and the band and also to monitor the secret key of the active Radio Frequency Identification Device tag of the locking device and of the active Radio Frequency Identification Device tag of the band for tampering.
3. The tamper proof mobile tracking system of claim 2, wherein the unique code sequence will allow the Radio Frequency Identification Device interrogator to detect any tampering of the base unit, the locking unit and the band if power is interrupted between the base unit, the locking unit and the band.
4. The tamper proof mobile tracking system of claim 3, wherein the active Radio Frequency Identification Device tag of the locking unit is programmed to follow a code and to store and encrypt a secret key.
5. The tamper proof mobile tracking system of claim 4, wherein the active Radio Frequency Identification Device tag of the band is programmed to follow a code and to store and encrypt a secret key.
6. The tamper proof mobile tracking system of claim 5, wherein the central unit is any network programmed to monitor or track persons being supervised by any entity via any communication protocol.
7. The tamper proof mobile tracking system of claim 6, wherein the locking pin is a single use locking pin.
8. The tamper proof mobile tracking system of claim 1, wherein the locking pin is a single use locking pin.
Description
DRAWINGS
(1) These and other features, aspects, and advantages of the present invention will become better understood with regards to the following description, appended claims, and drawings where:
(2)
(3)
(4)
(5)
(6)
(7)
DESCRIPTION
(8) Referring to
(9) The power supply 16 of the base unit 10 serves as a main power source for the base unit 10, the locking unit 20 and the band 30, wherein the base band transceiver 12 sends and receives an encrypted information from the central unit 40 as to the status of the faults and connections and the programming between the base unit 10, the locking unit 20 and the band 30, wherein GPS chip 14 serves to inform the central unit 40 of the location of the base unit 10, and wherein the RFID interrogator 19 first receives a command from the central unit 40 upon the base unit 10, the locking unit 20 and the band 30 all being operatively connected to program the active RFID tag 22 of the locking device 20 and the active RFID tag 32 of the band 30 with a unique code sequence that generates a secret key seed value and to monitor the connection between the locking unit 20 and the band 30 and also to monitor the secret key values of the active RFID tag 22 of the locking device 20 and of the active RFID tag 32 of the band 30 for physical and electronic tampering.
(10) The unique code sequence allows the RFID interrogator 19 to detect any secret key error which would indicate tampering of the base unit 10, the locking unit 20 and/or the band 30 if power is interrupted between the base unit 10, the locking unit 20 and the band 30.
(11) The active RFID tag 22 of the locking unit 20 is programmed by the RFID interrogator to follow a code to generate, to encrypt and to store a secret key.
(12) The active RFID tag 32 of the band 30 is programmed by the RFID interrogator 19 to follow a code to generate, encrypt and store a secret key.
(13) The central unit 40 is any network programmed to monitor or track persons being supervised by any entity via any communication protocol.
(14) The locking pin 24 of the locking unit 20 is a single use locking pin 24.
(15) As seen in the Flow chart of the Drawings, the Central Unit works with the devices of the present invention as follows:
(16) Power UpDevice initiates self start on power detection
(17) ICRInitial Configuration RegisterThis stores a value in non-volatile memory of 0 or I (zero or one)
(18) ICR=O Device is in initial configuration state
(19) ICR=I Device is in Normal state
(20) ICR can only be reset to ICR=O by an encrypted baseband command from the network
(21) Initial ConfigDevice enters initial configuration state
(22) Initial configuration:
(23) 1. Both the base unit, locking unit and band will generate a new key based on the seed value key that was received from the central unit
(24) 2. The new key will be based on the value of the initial key received from the central unit and the key generating algorithm
(25) 3. The new key will be stored on the RFID tags
(26) 4. Once the base unit, locking unit and band are properly assembled, the base unit will query the locking unit and band RFID tags
(27) 5. The base unit will verify the new keys
(28) BPDevice checks for presence of a valid locking unit
(29) H/W TestDevice performs self tests of componentsRFID tagsestablishes network link
(30) Key ExchangeDevice receives encryption key from network Device programs RFID with Key Reads back to confirm Key/Pairs
(31) Normal StateDevice is registered and active
(32) Normal State loop will run continuously unless Power loss or ICR reset command from network.
(33) KTKey Testtests the validity of the RFID tag key/pairs. This crucial test will fail on RFID tampering/spoofing or locking unit removal after power down since the key pairs will not match after restart or removal
(34) Key test details:
(35) In case of power down:
(36) 1. Both the base unit, locking unit and band will generate a new key based on the key that was stored prior to the power interruption
(37) 2. The new key will be based on the value of the old key and the key generating algorithm
(38) 3. The new key will be stored on the RFID tags
(39) 4. Once the base unit, locking unit and band are properly assembled, the base unit will query the locking unit and band RFID tags
(40) 5. The base unit will verify the new keys
(41) BPMBack Plate Monitorphysical electrical connection to back plate must be maintained. This test will fail on any physical backplate tampering/removal even after power down restart due to above key pair mismatch.
(42) Monitor and TrackDevice performs pre-programmed commands and transmits results to network.
(43) ICR ResetInitial Configuration Reset CommandEncrypted baseband message received from
(44) network that resets ICR to configuration state ICR=O This is used for authorized removal and reprogramming of device.
(45) An advantage of the present invention is that it provides a tamper proof mobile tracking system that allows governmental entities to monitor the tampering of devices used by the system.
(46) Another advantage of the present invention is that it provides a tamper proof mobile tracking system that deters inmates from attempting to tamper with devices used by the system.
(47) Yet another advantage of the present invention is that it provides a tamper proof mobile tracking system that provides monitoring devices that cannot be reproduced by 3-d printers.
(48) Still another advantage of the present invention is that it provides a tamper proof mobile tracking system that allows governmental entities to detect the tampering of devices used by the system.
(49) The embodiments of the apparatus and method of use described herein are exemplary and numerous modifications, combinations, variations, and rearrangements can be readily envisioned to achieve an equivalent result, all of which are intended to be embraced within the scope of the appended claims. Further, nothing in the above-provided discussions of the apparatus and method should be construed as limiting the invention to a particular embodiment or combination of embodiments. The scope of the invention is defined by the appended claims.