SYSTEM AND METHOD FOR UTILIZING MOBILE TELEPHONES TO COMBAT CRIME
First Claim
1. A system for utilizing mobile telephones to combat crime, comprising:
- one or more data repositories configured to store a list that contains one or more wanted serial numbers; and
a server in communication with a mobile telephone, wherein the server includes one or more processors configured to;
receive a message from the mobile telephone, wherein the message includes information that identifies a serial number that the mobile telephone obtained from a financial document;
compare the serial number that the mobile telephone obtained from the financial document to the one or more wanted serial numbers; and
determine that the financial document may have been used in a criminal activity in response to the serial number that the mobile telephone obtained from the financial document matching any of the one or more wanted serial numbers.
4 Assignments
0 Petitions
Accused Products
Abstract
The system and method described herein may validate and trace currency serial numbers, which may be extracted from the currency with a mobile telephone camera. The mobile telephone may use a messaging service to transmit the extracted serial numbers to a data processing facility, which may then compare the serial numbers transmitted from the mobile telephone to a list that includes information identifying currencies that are invalid, counterfeit, or known to be associated with criminal activities. In response to the extracted serial numbers matching any of the identifying information in the list, the currency may be deemed invalid. Furthermore, biometric information or information read from identification documents associated with an individual using the invalid or wanted currency may be obtained to help later identify the individual, and triangulation techniques may be used to track the mobile telephone and apprehend the individual.
98 Citations
53 Claims
-
1. A system for utilizing mobile telephones to combat crime, comprising:
-
one or more data repositories configured to store a list that contains one or more wanted serial numbers; and a server in communication with a mobile telephone, wherein the server includes one or more processors configured to; receive a message from the mobile telephone, wherein the message includes information that identifies a serial number that the mobile telephone obtained from a financial document; compare the serial number that the mobile telephone obtained from the financial document to the one or more wanted serial numbers; and determine that the financial document may have been used in a criminal activity in response to the serial number that the mobile telephone obtained from the financial document matching any of the one or more wanted serial numbers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for utilizing mobile telephones to combat crime, comprising:
-
receiving a message from a mobile telephone, wherein the message includes information that identifies a serial number that the mobile telephone obtained from a financial document; comparing the serial number that the mobile telephone obtained from the financial document to a list that contains one or more wanted serial numbers; and determining that the financial document may have been used in a criminal activity in response to the serial number obtained from the financial document matching any of the one or more wanted serial numbers. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for utilizing mobile telephones to combat crime, comprising:
-
one or more receivers configured to record one or more signals detected from one or more mobile telephones during a criminal activity; and one or more processors in communication with the one or more receivers, wherein the one or more processors are configured to; link the one or more mobile telephones to the criminal activity; and triangulate the one or more mobile telephones to track a suspected perpetrator of the criminal activity. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A method for utilizing mobile telephones to combat crime, comprising:
-
recording one or more signals detected from one or more mobile telephones during a criminal activity, wherein recording the one or more detected signals includes linking the one or more mobile telephones to the criminal activity; and triangulating the one or more mobile telephones, wherein triangulating the one or more mobile telephones includes tracking a suspected perpetrator of the criminal activity. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method for utilizing mobile telephones to combat crime, comprising:
-
capturing an image associated with a suspect bill using a camera on a mobile telephone; executing optical character recognition software on the mobile telephone to capture a serial number associated with the suspect bill, wherein the optical character recognition software captures the serial number from the image associated with the suspect bill; and transmitting a message that identifies the serial number captured with the optical character recognition software from the mobile telephone to a data processing facility. - View Dependent Claims (35)
-
-
36. A method for utilizing mobile telephones to combat crime, comprising:
-
obtaining a serial number associated with a suspect bill on a mobile telephone; comparing the serial number associated with the suspect bill to a list that contains one or more wanted serial numbers, wherein the mobile device stores the list that contains the one or more wanted serial numbers in a local memory; and flagging the suspect bill to indicate that the suspect bill may have been used in a criminal activity in response to the serial number obtained from the suspect bill matching any of the one or more wanted serial numbers in the list stored in the local memory associated with the mobile telephone. - View Dependent Claims (37, 38, 39, 40, 41, 42)
-
-
43. A method for utilizing mobile telephones to combat crime, comprising:
-
obtaining, on a computing device, a serial number and denomination associated with a suspect bill from an image associated with the suspect bill; querying a database containing all valid banknote serial numbers with the serial number and denomination associated with the suspect bill; and receiving, at the computing device, a notification relating to a legitimacy associated with the suspect bill based on whether the serial number and denomination associated with the suspect bill matches any of the valid banknote serial numbers in the database. - View Dependent Claims (44, 45, 46)
-
-
47. A method for utilizing mobile telephones to combat crime, comprising:
-
capturing one or more images associated with a transaction involving a suspect financial document using a camera on a mobile telephone, wherein the one or more images include an image of the suspect financial document and an image of an identification document associated with an individual that used the suspect financial document in the transaction; capturing video that documents one or more events associated with the transaction involving the suspect financial document using a video function on the mobile telephone; and transmitting one or more messages that include the one or more images associated with the transaction and the video that documents the one or more events associated with the transaction from the mobile telephone to a control center. - View Dependent Claims (48, 49, 50, 51)
-
-
52. A method for managing currency serial numbers to combat crime, comprising:
-
obtaining, at a money counting device, serial numbers associated with a substantially high volume of currency documents counted in the money counting device; uploading the serial numbers associated with the currency documents counted in the money counting device from a local processor associated with the money counting device to a control center having a database that stores information relating to wanted serial numbers, wherein the control center adds information relating to the serial numbers uploaded from the money counting device to the information stored in the database; and downloading the information stored in the database, including the information relating to the wanted serial numbers, from the control center to the local processor associated with the money counting device.
-
-
53. A method for utilizing mobile telephones to combat crime, comprising:
-
obtaining, at a mobile telephone, one or more serial numbers associated with one or more currency documents; uploading the one or more serial numbers associated with the one or more currency documents from the mobile telephone to a control center having a database that stores information relating to wanted serial numbers, wherein the control center adds information relating to the one or more serial numbers uploaded from the mobile telephone to the information stored in the database; and downloading the information stored in the database, including the information relating to the wanted serial numbers, from the control center to a local memory associated with the mobile telephone.
-
Specification