Method for Tracking and Monitoring Firearms
    53.
    发明申请

    公开(公告)号:US20190316860A1

    公开(公告)日:2019-10-17

    申请号:US16382134

    申请日:2019-04-11

    Abstract: The method for tracking and monitoring firearms provides a global positioning system (GPS)-enabled firearm ammunition magazine for all firearm types. A standard magazine is internally fitted with a GPS tracking unit, making the magazine look like any other firearm ammunition magazine. The GPS-enabled firearm ammunition magazine provides the information necessary for its recovery in the event of theft, misplacement, or other loss. GPS data is sent to at least one remote server, where it is recorded and processed. The remote server can send signals back to the magazine so that a mechanical securing mechanism integrated into the firearm magazine can actuate, preventing bullets from entering the firearm chamber. An application programming interface enables integration of the present invention with existing security cameras, thus allowing the remote servers to access and archive relevant video footage of an equipped firearm magazine.

    Theft detection system
    55.
    发明授权

    公开(公告)号:US10373455B1

    公开(公告)日:2019-08-06

    申请号:US16056730

    申请日:2018-08-07

    Abstract: A theft detection system includes a portable security device having a casing and a motion sensor operable to detect a movement of the casing. A transmitter positioned in the casing transmits a theft alert signal motion is detected. The theft detection system includes a software application running on a mobile communications device remote from the portable security device that receives the theft alert signal and initiates a theft alert action, such as energizing an alarm or transmitting an alert and GPS coordinates, if the theft alert signal is indicative of unauthorized movement of the portable security device. The theft detection system may also include a fixed-position security device and a supplemental motion sensor. If motion is detected inside the housing and entry to the housing cannot be authenticated, the fixed-position security device will make a theft-alert action, such as sounding an alarm, transmitting an alert signal.

    System and method for radio and wireless measurements tracking and reporting

    公开(公告)号:US10345450B2

    公开(公告)日:2019-07-09

    申请号:US14583744

    申请日:2014-12-28

    Abstract: A monitoring system that utilizes Geo-mapping tools collaborating with a network and tracking devices to establish geo-fencing and predictive policing technology which can be used to do simple monitoring tasks, necessary interventions, or archive details as evidence for reports. The tracking devices are capable of communicating to the network via wireless signals provided by various carriers or independently. The Network is programmed with thresholds which are assigned to tracking devices and communicates to the Network via wireless transmission signals. The tracking devices are continuously monitored by the network and provide real-time alerts and detailed time-stamped reports when the thresholds are met. The tracking devices are equipped with many sensors which aid with monitoring the established thresholds and the ability to communicate between each other independent of the network. A mobile virtual private network provides the ability to communicate with tracking devices without the need of a carrier network.

    Location tracking for locking device

    公开(公告)号:US10262484B2

    公开(公告)日:2019-04-16

    申请号:US15587034

    申请日:2017-05-04

    Abstract: Disclosed are methods, systems, and computer-readable media for wireless key management for authentication. Authentication includes transmitting a request to a locking device, transmitting a security challenge to the mobile device, and transmitting a response to the challenge and an encrypted user profile for the locking device. The response includes data generated with an access key that is stored by both the mobile device and the locking device, and the user profile is encrypted by a server using a secret key that is stored by the server and the locking device. Authentication further includes verifying the response to the challenge, where the response is verified using the access key, and validating additional data from the mobile device. An action of the locking device may be initiated as specified by the request.

Patent Agency Ranking