Method and system for protecting individuals and property
First Claim
Patent Images
1. A method of protecting a first individual or property from potential criminal activity, including the steps of:
- taking a photograph of a second individual or property;
transmitting said photograph to a secure database provided at a location remote from the individual or personal property; and
allowing access of said photograph from said secure database by an authorized entity, in the event of the occurrence of the criminal activity.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method of protecting individuals or property from a potential risk. A centralized, secure database is established for receipt of photographs and additional information taken by a subscriber of another individual, or scene. This information would be inputted into the subscriber'"'"'s file. In the event of a criminal incident, the proper legal authority would have access to the subscriber'"'"'s file. This would allow information included in the subscriber'"'"'s file to be used in the investigative process related to that criminal incident.
-
Citations
11 Claims
-
1. A method of protecting a first individual or property from potential criminal activity, including the steps of:
-
taking a photograph of a second individual or property;
transmitting said photograph to a secure database provided at a location remote from the individual or personal property; and
allowing access of said photograph from said secure database by an authorized entity, in the event of the occurrence of the criminal activity. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for protecting a first individual or property from potential criminal activity comprising:
-
a camera producing a photograph of a second individual or property;
a private, secure database, provided with a plurality of individual data;
a means utilizing the internet for transmitting said photograph to one of said individual data files in said private secure database; and
a secure means whereby a law enforcement or public safety agency may gain access to the contents of one of said individual data files, held in said secure database, in the event of the occurrence of a criminal activity. - View Dependent Claims (9, 10, 11)
-
Specification