System and Method for Radio and Wireless Measurements Tracking and Reporting

ABSTRACT

A monitoring system that utilizes Geo-mapping tools collaborating with a network and tracking devices to establish geo-fencing and predictive policing technology which can be used to do simple monitoring tasks, necessary interventions, or archive details as evidence for reports. The tracking devices are capable of communicating to the network via wireless signals provided by various carriers or independently. The Network is programmed with thresholds which are assigned to tracking devices and communicates to the Network via wireless transmission signals. The tracking devices are continuously monitored by the network and provide real-time alerts and detailed time-stamped reports when the thresholds are met. The tracking devices are equipped with many sensors which aid with monitoring the established thresholds and the ability to communicate between each other independent of the network. A mobile virtual private network provides the ability to communicate with tracking devices without the need of a carrier network.

CLAIM TO PRIORITY

This Non-Provisional application claims under 35 U.S.C. §120, thebenefit of the Provisional Application 61/921,904, filed Dec. 30, 2013,Titled “System and Method for Radio and Wireless Measurements, Trackingand Reporting” which is hereby incorporated by reference in itsentirety.

COPYRIGHT NOTICE

A portion of the disclosure of this patent document contains materialwhich is subject to copyright protection. The copyright owner has noobjection to the facsimile reproduction of the patent document or thepatent disclosure, as it appears in the Patent and Trademark Officepatent file or records, but otherwise reserves all copyright rightswhatsoever.

BACKGROUND

The invention disclosed in this document relates generally to trackingsystems to enforce compliance with court ordered restrictions on thelocation and movement of individuals. Court issued restraining ordersexist to permit a first individual who is being harassed by a secondindividual to place limits on the second individual's proximity to thefirst individual's location. While the order is in force, the secondindividual risks incarceration if they are caught violating theprovisions of the restraining or protective order. At issue is the meanswhereby the second individual may be monitored and apprehended if thesecond individual is in violation of the restrictions placed on themwith respect to the first individual's location. Often, the provisionsof a court order are violated without the violation coming to theattention of law enforcement until after the violation has occurred.

Tracking methods have improved to the point where a tracking device maybe attached to a second individual and permit law enforcement to knowthe location of any individual so tagged. However, law enforcementorganizations do not have the manpower to constantly monitor trackingdevices on the chance that an individual might violate the conditions ofa protective or restraining order. This deficiency can be overcomethrough the use of automated monitoring, where a computer withappropriate tracking software and alerts to the law enforcementorganization when violations occur. A law enforcement organization maythen take action to enforce the existing order.

DESCRIPTION OF THE DRAWINGS

FIG. 1—A diagram of the Network, monitoring system and tracking devicesconsistent with the certain embodiments of the present invention.

FIG. 2—A diagram of the Network, monitoring system, tracking deviceswith sensor consistent with the certain embodiments of the presentinvention.

FIG. 3—A diagram of the Virtual Private Mobile Network consistent withthe certain embodiments of the present invention.

FIG. 4—flow chart of Predictive Policing steps to enforce protectiveorders consistent with the certain embodiments of the present invention.

FIG. 5—Data Structure and Tables of the Predictive Policing Process ofthe Network to enforce protective orders consistent with the certainembodiment of the present invention.

FIG. 6—architecture model for network and a coordinating mobile networkconsistent with the certain embodiments of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

The invention relates to a method of performing measurements ofdistances of radio and any type of wireless signal transmittingtechnology which establishes thresholds and generates notices andreal-time alerts when thresholds are met.

A tracking system for monitoring an entity using one or more primarytracking apparatuses is carried by a first entity. The primary trackingapparatus including one or more sensors and one or more secondarytracking apparatuses are carried by a second entity. The secondarytracking apparatus including one or more sensors, where each trackingapparatus includes a monitoring and reporting device, a storage device,and access to a network. Each tracking apparatus may have one or moresignal transmitting technologies to communicate with the network througha wireless communications network, the tracking apparatuses having alocal communications network to communicate with each other. Eachmonitoring and reporting device used for monitoring in real-time has oneor more variables collected from the tracking apparatuses through thenetwork. The monitoring and reporting devices are further used forsending one or more reports regarding the variables collected to one ormore authorities through the network. Each monitoring and reportingdevice is further capable of saving the reports to the storage device.The system may also have one or more alert systems installed on at leastone of the tracking apparatuses.

The local communications network of this tracking system transmitsinformation over an associated radio frequency. The radio frequency isused for measuring a distance between the primary and secondary trackingapparatuses and the alert system signals an alert when the distancebetween the primary and secondary tracking apparatuses are within apredetermined distance from each other.

The alert system of this tracking system transmits an alert to at leastone of the tracking apparatuses. The alert system signals an alert tothe tracking system through the wireless communications network. Atleast one of the tracking apparatuses is carried by being embeddedwithin the entities. The tracking system's secondary tracking apparatusis placed at a location.

One or more sensors of the tracking system can detect the variablesselected from one or more of the following group: moisture types,moisture levels, body temperature, environment temperature, heart rate,audio, water levels, motion detection, blood type of carrier, lightlevels and vitals. The sensors programming contain the entity who iswearing the apparatuses medical records and vital records used topre-establish one or more thresholds, and the alert system sending analert to the network when the sensor detects that the one or morevariables are not within the one or more pre-established thresholds. Thenetwork of this tracking system transmits a real-time alert to one ormore authorities after receiving the alert and can simultaneouslytransmits a real-time alert to one or more secondary trackingapparatuses.

The signal transmitting technology of the tracking system is selectedfrom the group comprising: cellular, GPS, CDMA, LTE, Wi-Fi, Bluetooth,radio, RFID satellite and signals derived from technology being evolvedand not yet on the market. The tracking apparatuses of this trackingsystem communicate through the local communications network usingBluetooth, radio or RFID and technologies being evolved and not yet onthe market. The real-time alert system emits an electronic shock to theentity carrying one of the primary tracking apparatuses when the primaryand secondary tracking apparatuses are within a pre-determined distancefrom each other. Electronic shock may also be triggered on the primaryapparatuses by an authority with remote access transmitting a signalthrough the network.

The alert system of the tracking system is triggered when the entitycarrying the primary tracking apparatus is no longer attached to orcarries the primary tracking apparatus. The tracking system alsotriggers the alert system when the primary apparatus loses communicationwith the monitoring network system. The tracking systems variableincludes pre-defined geographical locations and/or is the entities'physical location. The monitoring and reporting device further includesa geographical mapping tool for real-time location monitoring andreporting of the tracking apparatuses.

The tracking system includes a mobile network that monitors one or morevariables collected from the primary and secondary tracking apparatuses;the mobile network sends the variables collected to the network. Themobile network of the tracking system is capable of independently andprivately monitoring the primary and secondary tracking apparatuses. Thetransceiver node of the mobile network is the size of a credit card orsmaller.

The tracking system where the first entity is an asset and the secondentity is the owner of the asset. The first entity includes one or moresensors. The second can track and monitor the first entity and thesecond entity receives alerts based on predetermined thresholds beingestablished. The second entity can track and monitor the first entityand visually see the first entity's physical locations and can recordand store the data.

The tracking network provides a method for tracking an entity named in acourt order comprising the steps by placing a primary tracking apparatuson the entity, which is identified as an offender and if necessary byplacing a secondary tracking apparatus on a victim. The locations of theprimary and secondary tracking apparatuses are continuously monitoredusing a tracking system network. The tracking system constantly measuresthe distance between the primary and secondary tracking apparatusesusing a local communications network between the primary and secondarytracking apparatuses. A real-time alert is transmitted when thelocations of the tracking apparatuses are within a defined distance,and/or when the distance between the tracking apparatuses are within adefined distance, and/or when one of the tracking apparatuses indicatesthat it has been tampered with. The alert is generated from at least oneof the tracking apparatuses and sent to the network. The alert isgenerated from the network and is sent to the other tracking apparatus.By combining predetermined thresholds that are programmed in the networkwith the real-time data collected from the apparatuses the Network iscapable of providing various levels of alerts.

This tracking system uses a method for tracking where the trackingapparatus indicates that it has been tampered with by measuring one ormore vital signs of the entity wearing the tracking apparatus andcomparing the measured vital signs with one or more pre-definedthresholds and it will send a signal indicating that one or more of themeasured vital signs is outside of the pre-defined thresholds.

This tracking system uses a method where the tracking apparatusindicates that it has been tampered with by measuring one or moreenvironmental conditions of the tracking apparatus, and compare themeasured environmental conditions with one or more pre-definedthresholds and it will sending a signal indicating that one or more ofthe measured environmental conditions is outside of the pre-definedthresholds. The method where the tracking apparatus indicates that ithas been tampered with by using the sensors and elements in theapparatus recognizing the apparatus has been altered, opened or removedfrom communications of any of the signals.

Referring to FIGS. 1 and 2, an illustrative non-limiting embodiment ofthe present invention is shown as a monitoring and tracking system 5 andone or more remote devices 20 22. The Tracking system 5 includes aMonitoring and Reporting device 10, storage 12, network 14 and alertmechanism 16 that works within the Tracking system 5 and also externallyon the remote devices 20 22.

As further shown, the monitoring and tracking System 5 of the inventioncommunicates via a wireless device or system 18, to the trackingapparatuses 20 and 22. The tracking apparatuses 20 22 are designed tohave a combination of different types of wireless technology that can betracked by various wireless signals and a radio signal which is used forlocalized detection. The Mobile Network 24 (FIG. 3) stands alone andprovides the same functions as the Network 14 but provides a privatetracking network that is portable. Private Tracking Network is similarto a Private Virtual Network but mobile. It is standalone and does notneed access to the cloud or any carrier or resource to function and itcan operate off of batteries. Sensory circuits 25 are embedded withinthe tracking apparatuses 20, 22 to provide data informing the Network 14if the tracking apparatuses are broken or detached from an entity, it isalso used to provide statistical medical data and environmental data.

The tracking system 5, and particularly the network 24, is preferablyimplemented as a computer or other processing device. The computers havea memory (such as storage 12), processing capacity, a display device andan input device such as a keyboard, touchscreen or mouse. Unlessotherwise stated, the steps performed herein are all performedautomatically in real-time by the processor, without manual interactionafter it is programmed.

One significant use of the tracking apparatuses 20 and 22 when combinedwith the Network 14 is to deter violators of protective and restrainingorders, or offenders of other type of court orders. It is particularlyuseful for law enforcement purposes to enhance predictive policingabilities to provide real-time statistics and alerts for more efficientintervention of crimes. For example referring to the flow chart in FIG.4 if there is a protective order issued by the court or when a courtorder is issued, step 50, the data is entered into the Network 14, step52. The tracking apparatus 20 is identified as the Primary, step 54, andis attached to the offender and another tracking apparatus 22 isidentified as the Secondary, step 56, which is attached to the victim.At step 58, data sent by the tracking apparatuses 20, 22 are collectedby the Network and used as evidence to enforce protective orders. If thedetails of the order are violated or the apparatuses are tampered with,step 60, an alert with details is sent to the secondary device (step 62)so they can seek safety, to the authorities (step 64) so that they canintervene and a report is generated (step 66) to be used as evidence incourt. The reports are stored and backed up, step 68.

FIG. 4 is a flow chart demonstrating the necessary process to establishthe thresholds and monitor and collect the necessary data for thenetwork to perform the predictive policing tool and react in real-timeto generate in the necessary alerts and reports for intervention when acourt order (restraining order) is being violated.

Though one implementation of the invention is for protective orders,with a network constantly monitoring tracking devices collectingnecessary data to provide to the predictive policing analysis of thenetwork for the purposes of monitoring, sending real-time alerts andgenerating detailed time stamped reports it can also be used andprogrammed to enforce many other court orders including pedophiles,parolees, and repeat offenders. It can also be used to monitor taggedassets and monitor mass groups identifying associations in the groupwhich ideally can be used for assisting authorities with the humantrafficking issues or search and rescue missions. The sensors aid withthe predictive policing analysis performed by the network technologyenabling the tracking devices to operate independently from the networkand communicate between each other or with the Mobile Virtual PrivateNetwork independent and off the grid.

Referring to FIG. 1, when a protective order is issued the details ofthe order are programmed into the Network computer 14. Primary Trackingapparatuses 20 are locked on to the offender and Secondary trackingapparatuses 22 are provided to or locked to the victim/s. The devices20, 22 are turned on and activated to communicate with the Network 14via the Wireless signals over the wireless communications network 16.The Tracking Apparatuses 20 22 are programmed to be associated with eachother's radio frequency with a distance established so that thesecondary tracking apparatuses 22 can detect when the Primary trackingapparatuses 20 is close. For example, if the protective orderestablished a distance between the entities to be 1,000 feet; if thetracking apparatuses 20, 22 ever get too close or within the 1,000 ft.of each other, details of the distance are updated to the SecondaryTracking apparatuses 22 so that they can try to seek safety and protectthemselves. The Primary Tracking apparatuses 20 will sound off a loudaudio alarm if it is too close and emit an electronic shock, similar toa Taser gun, to temporarily disable the entity wearing the Primarytracking device 20 will be activated if necessary.

Once the tracking apparatuses 20 22 are activated the Network monitorsthem 24 hours a day, 7 days a week. All details including date time andlocation of where they are will be recorded and stored in our storagedevices 12 to be used if necessary. The network 14 constantly monitorsthe tracking apparatuses 20, 22 and the thresholds that were establishedand programmed. The network 14 processing device performs all themonitoring and calculations to determine if the thresholds of thevariables are being breached. If the thresholds are ever met, theNetwork 14 is programmed to send out alerts 16 to the secondary 22 sothey are aware of where the primary is, and to all the authorities thatare authorized to access the system. At the same time details of thethresholds being breached are sent to the Monitoring and Recording 10 toprint out a report to be used as evidence to enforce the order.

If the tracking apparatuses 20, 22 are ever tampered with or removed,the Network 14 detects this and alerts are sent out to the authoritiesand to the Monitoring and Recording module 10 and can be used asevidence. The tracking apparatuses 20 are designed with a loud audiblealarm that sounds off if it is removed improperly or if it breaches thethresholds programmed into the network 14.

The Tracking apparatuses 20 22 have a sensor 25 that is attached tothem. The sensor 25 is used to further identify the person, animal orthing it is attached to and ensure the tracking apparatuses 20, 22 stayattached to the entities. It can detect temperature, moisture, vitalsigns. It can store information to be monitored such as the entitiesidentity and medical information which can be accessed by medicalpersonnel or authorized entities in emergency situations. These thingscan aid in helping people with many medical issues and to further ID theperson wearing the device. The sensor 25 monitors body temperature andmoisture to ensure the tracking apparatuses 20 22 are still attached tothe entity it was locked on to. That information is regularly sent tothe network computer 14. If any of these things should changedrastically the Network 14 detects this and sends out alerts withdetails to the proper authorities. The sensor 25 also monitors andcollects vital statistics data of the entity it is attached to and sendsa report of that data to Network 14. This invention is intelligentenough to recognize environmental changes such as if it is submerged inwater and to determine changes of body temperature changes or moistureor heart beat detecting if it is detached from the entity. Its otherfunctions are to assist with medical situations such as monitoring vitalstatistics and sending reports to the Network 14 for medical purposes.

Network: 14

Referring to FIG. 1, the Network computer 14 monitors whatever variablesare programmed in it. The backend is the back layer of the computersystem where the software code is that generates the calculations of allthe variables that are programmed into the Network 14. Variables for theNetwork come from unlimited sources. Variables are either collected by adevice and automatically up loaded into the Network 14 or programmedinto the Network 14. The variables include IP address that we assignassociating the tracking apparatuses 20 22, locations, addresses, time,and a delta of distance that apparatuses must abide by. The algorithm inthe backend is designed to monitor these variables in real-time.

The Network 14 collects data from the tracking apparatuses 20 22 via thewireless network signals 18. This data is used to compare the thresholdsprogrammed into the backend of Network 14. It also collects data fromaudio and video equipment from satellite geographical updates that areprogrammed to send information to the Network 14 and. Other variablesunique to a person, such as their blood type, DNA, physical featuressuch as face recognition, finger printing and other means of identifyingan entity if available are programmed into the Network 14 formonitoring.

The front end is where the user friendly software is downloaded tooperate the Network 14. It is accessed via computers or other electronicdevices that can link up to the network. It hosts the geographicalmapping tool that is used to visually watch the tracking apparatuses 2022 and it is where the details of the orders are entered in to theNetwork 14. The geographical mapping tool provides a visual of thetracking apparatuses 20, 22 at all times. Any well-known suitablegeographical mapping tool can be utilized. Thus, the backend is wherethe invention software is located and operating. The frontend can alsoincorporate software of the invention as well as incorporate any othersoftware for user friendly access.

The Network 14 is designed so that it can be programmed to send reports,notices and alerts with various details to entities that are designatedto receive them. Entities such as legal authorities, medicalprofessionals, schools, hospitals will receive alerts and reportsdetailing the alerts. Real-time visual geographical tracking results ofthe apparatuses are available to authorized entities. The Network isprogrammed to communicate with our apparatuses, but can communicate withother devices.

Tracking Apparatuses 20, 22

Referring to all figures, the tracking apparatuses 20, 22 are programmedand assigned with individual unique identities. These identities arerecognized by the tracking Network 14. The Tracking Apparatuses areprogrammed as a Primary 20 and as Secondary 22. The Network 14 isprogrammed to associate the identification between the Primary 20 andSecondary 22 tracking apparatuses, such as in a lookup table or thelike. There is generally only one Primary apparatus 20 associated withone or more (indefinite amount) Secondary apparatuses 22. However, morethan one Primary 20 tracking apparatuses can be associated with eachSecondary tracking apparatuses 22.

The primary and secondary apparatuses are similar utilizing the samewireless transmitting signals but they are designed different where thesecondary 22 has alarms that will activate when it receive alerts thatthe primary 20 breached any thresholds that are established. The Primary20 is designed where its original circuitry can emit electronic signalslike Taser gun.

The backend of the Network 14 detects and records if any of theprogrammed thresholds are breached. Details such as the timestamp, nameof people involved, case number, and the geographical locations of theapparatuses are sent to whoever is programmed to receive them. Thereal-time visual of the apparatuses 20 22 can be viewed on a map withavailable electronic devises by entering authorized user codes. Thismonitoring will be as close to real-time monitoring as currenttechnology offers.

Multiple (preferably 3-4) types of wireless signals are used in theinvention as backup in case a signal drops. Those signals can includeGPS, CDMA, GSM, satellite, WIFI, Radio, and RFID. Geographical trackingis done by utilizing any well-known mapping tool such as google maps ora satellite tool. The mapping tool is integrated with the software inthe backend of Network 14. This calculates the delta between apparatusesand any thresholds that are programmed into the backend of the network14. If these thresholds are ever met or breached the algorithmestablishes flags on what has been breached and send alerts. Forexample: There is an order defining that two people are supposed to staymore than 1000 feet apart from each other and legal authorities and oneof them should get an alert if the other gets to close providing detailsof the breach. They will be ordered to wear the tracking apparatuses 20,22. The network 14 monitors these thresholds and if that person isrecognized by the network 14 as going in the same direction as they aresupposed to stay away from it will be flagged in the software code to bemonitored more closely and if it reaches the boundaries that have beenestablished then the network will send out alerts to whomever areprogrammed to receive details of this breach. The algorithm can performall kinds of calculations for all types of variables. It is not justlimited to what we just demonstrated here. The backend and frontend aretied together via any well-known APL.

The tracking apparatuses 20, 22 are designed to be tamper proof andwater resistant. They are designed to be worn by humans, animals orattached to items or even be set up to establish locations such as ahouse. The apparatuses are made of a material that cannot be easilydestroyed. Their locking mechanism is designed so that it cannot beinvaded or disconnected without a person of authority's assistance. Theapparatuses generate a signal that sends out an alert to authorities ifit is removed or if it is tampered with or destroyed in any manner. Itis also designed to generate an electrical signal similar to Taser gunthat can be used to temporarily impair and disable the entity wearingthe device if approved by legal authorities.

The tracking apparatuses 20, 22 detects when it has been tampered withby constantly sending a signal to the Network 14 to be monitored. TheNetwork routinely monitors and validates the apparatuses using thesoftware in the backend of Network 14. This communication occurs byusing the wireless signals 18. For example the Network 14 is programmedto monitor them every 10 seconds; if it misses more than two 10 secondsignals then it is flagged to be checked every 3 seconds. If nothing isdetected it confirms the last known location and send out alerts withdetails to the secondary tracking apparatuses so they can seek safetyand to the authorities so they can track down the Primary trackingapparatus 20.

Apparatuses 20, 22 are small microscopic size Microchip designed to beeasily disguised when locked onto the entities to be non-evasive or canbe inserted into entities. Power sources utilized for the Trackingapparatuses 20, 22 are any well-known and suitable source. We canutilize any type of power source such as Rechargeable batteries, solarbatteries, power sources that work off of motion. Sources can becombined if necessary to improve longevity and reliability.

Wireless Technology 18

Referring to FIGS. 1 and 2, each tracking apparatus 20, 22 are layeredwith different tiers of signal transmitting technology so if one tierfails to be able to communicate to the Network another tier will pickup. The signals use any well-known and suitable existing technology andis not limited to cellular, WIFI, radio and satellite. The radio signalor RFID is used for local tracking, when wireless technology is notavailable. The Tracking apparatus 20, 22 shall be able to incorporateany type of technology existing for transmitting signals. Theflexibility of this engineering allows us to operate more globally inenvironments with different types of signally technology and upgrade astechnology changes.

The Radio signal utilizes existing technology providing a trackingability in remote locations lacking in wireless technology.

Monitoring and Reporting 10

Referring to FIG. 1 the monitoring and reporting mechanism operates inthe frontend of the Network 14. The data transmitted is delivered to atool that provides a more detailed and user friendly geographicalmapping device clearly identifying the location and movements of eachtracking apparatus 20 22. The Primary use and purpose of this is toestablish a means to track and document the Primary apparatuses 20geographical location and determine when it reaches the programmedthreshold of distance with the Secondary apparatuses 22. The Network 14generates a time stamp of this occurrence and send alerts providingvaluable information indicating how close the apparatus are and at whatrate they are traveling. These details can be used by the authoritiesand by the victim to intervene if necessary.

Should any of the associated tracking apparatuses 20, 22 reach theestablished range or distance or breach any other variable programmedbetween them a real-time detailed report is generated, which can be usedas evidence. The reports provide all the details necessary to enforcethe order including case numbers, identity, time stamps and details ofthe violation and victim's name.

Sensoring Circuits: 25

Referring to all Figures for apparatuses 20, 22, the sensors are acomputerized chip with a processor and memory that is designed to detectbody characteristics and local environment. They are microscopic in sizeand can easily be embedded wherever they need to be. The sensors 25 areconnected to the circuitry of the apparatuses 20, 22. They detect thevital statistics and environmental statics such as moisture types andlevels, temperature, heart rate, audio, water levels, motion, bloodtype, light. These sensors are programmed with the entities currentmedical records and vital records to pre-establish certain variables forthresholds. These thresholds are programmed into the sensors 25 and whenthey are breached an alert is sent to the Network 14 which then sendsalerts to the proper authorities. Having programmed thresholds on thesensor eliminates the need for the network to constantly have tocommunicate with the devices. Data that the sensors are to monitor isstored in the memory of the sensory chip. Data such as normal heart rateand temperature patterns, blood type and sugar levels are programmedinto the memory. The processor continuously collects data from thesensors which checks for the thresholds that are established in thememory for example a temperature or heart rate. The external sensors aremade of material that touches the entity it is to monitor and has theability to collect vital signs. If any of these thresholds drasticallychanges a red flag is established and the processor will communicate tothe apparatus which will then communicate to the Network that somethingis not right and an alarm will be issued to the proper authorities.

As shown, the sensor 25 can have a processor, memory, interface, sensorinterface, and external sensor interface.

The data can also be used to provide details that can be used formedical tracking purposes for diagnosis and treatment alerts. Real-timeStatistics of the vitals are monitored and recorded providing a resourceof information that can be used to provide medical assistance ifnecessary. The data is also used to apply an ID associated for theapparatuses.

Aside from the intended purpose to detect when a tracking apparatus 20,22 has been breached these can be used for elderly homes and hospitalcare, child care, disabled people or people with critical medicalconditions.

Storage 12

Electronic storage is important to this invention so as to keep andmaintain records for future purposes. Any well-known and suitabletechnology providing storage can be utilized. One key element is thesecurity of the storage. Utilizing existing technology we can develop asecure access to the Network that only authorized entities will haveaccess to.

Mobile Network 24

Referring to FIG. 3 a Mobile Network device 24 utilizes the samesoftware code as in our Network 14 in FIGS. 1 and 2 providing astandalone remote Network. It is the size of a credit card and monitorsabout 10,000 tracking apparatuses. It allows the tracking apparatuses20, 22 to be tracked simultaneously with Network 14 or without. Itoperates independently and provides a means to monitor more localsecluded situations similar to a Virtual Private Network. It can also beused as an emergency Network for emergency situations to aid with rescuemissions or during evacuations or emergency situations. It operates offof any type of signaling type device for communicating with the devicesit monitors. Its main purpose is to provide tracking solutions to remotelocations or if there is limited signals in the area. It can run off ofAC or DC power. Authorities tracking entities that violated the ordercan use this when they are in pursuit. It can also be used for privateNetwork monitoring of a controlled and/or contained environment.

The network device 24 can use the same code as Network 14 it can eitherbe used linked up to Network 14 or independently if you want to haveyour own Private Network zone to monitor, it operates similar to aPrivate Virtual Network. It is designed to be used as a mobile networkwith the capabilities to monitor as many as but not limited to 10,000devices per card. Each card is currently but not limited to the size ofa credit card. You can daisy chain as many network cards as you need forthe mobile unit. It does not have to communicate to the cloud or throughthe network 14 it can operate completely independent and off the grid.It has its own wireless network or it can be connected to any availablenetwork. It can have its own wireless connection to communicate directlyto the tracking apparatuses 20, 22. Its primary use is to either set upa private tracking environment for a business such as monitoring peopleand entities in a field study or it can be used as the portable unitthat the police would carry to track down violators. Unlike the network14, the mobile unit 24 does not need to have a reporting system. It canset up its own private tracking network that only it can see using itsown radio or wireless signals to communicate with apparatuses. It canalso interface with the network 14. The unit 24 can be daisy chained toincrease bandwidth. The credit card size networks are placed inside adurable case. Any type of wireless signals can be installed to track theapparatuses. Utilizing any existing wireless technology you can buildout a Private Network to track and monitor a defined area.

The Mobile virtual private network is like having a private buffer tomonitor any entity with. For example it can be used to monitor a fieldstudy of 3000 animals and plants and 20 scientists in a 1 mile radiusand you don't want anyone to be able to hack into it or use it from anyother source. The tracking devices can be put where you want them, setup the Mobile network with the thresholds you want to monitor and it istracking just those things. It can detect things that belong anddetermine if something does not belong in the environment. Anotherexample is a lab environment to monitor all entities that come into thelab area.

Thus, unit 24 is a mobile unit that can stand alone. It has remotecapabilities and runs off of DC and/or AC. It is like having your ownprivate bubble to monitor. A private virtual tracking Network. You canput in your own private wireless signals to match up to the apparatusesyou are tracking, it is designed so that no one else can see what youare doing. It can also be used for remote tracking for areas that arelow on cellular type signals. It is also for the police to use whilemobile, so they can quickly lock in on the signals of the apparatusesthat are on the run.

Tracking any Type of Device for Meetings or Events

Referring to FIG. 2, an illustrative non-limiting embodiment of thepresent invention is shown as a monitoring and tracking system 5 and anyprogrammable location with longitude and latitude, electronic devicethat has an IP that can be established for tracking purposes. Utilizingthe same proprietary software that is in the frontend of Network 14 anytype of electronic device and location can be monitored. Users, viatheir electronic devices, can login to the Network, program details ofan event such as date, time location and other entities they wish toinvite. Once the event is programmed into the Network all entities thatwere invited have an option to login in and accept. Once the entitiesaccept, their devices are activated to be monitored by the Network 14.The entities have the choice to log out at any time disconnecting thetracking. All entities that have accepted the invitation can have accessto a geographical map monitoring all the other devices that logged infor the event. The details are monitored and recorded then as eachentity reaches the destination of the event alerts and notices are sentout to all the entities registered for the event letting them know whohas arrived. Its Primary use is for scheduling events or meetinglocations allowing people who are invited to get alerts when peoplearrive to the event and to visually see how far away people are that areattending the event and receive details of their estimated time ofarrival.

In one embodiment, the frontend is accessed through one or more socialmedia accounts such as Facebook. The frontend may further incorporateadditional tools that may be accessed through a social media account.For example, the software may include functionality to tag one or morefriends on social media. The software may further include functionalitysuch as the ability to automatically update a user's status indicatingtheir arrival at a location. The frontend may be able to create an eventand send invites to the event to one or more other users on a socialmedia platform.

This is also a great tool for parents who are on vacation and want toestablish places to meet with their children and for school field tripsso that teachers can monitor the activities of the children.

Referring to FIG. 5 is an overall sample data structure for programmingthe Network 14 (of FIG. 1), in particular to enable the functionalembodiment of the invention as a monitoring and tracking network fortracking an offender with respect to relative position of a victim, therelationship and threshold being programmed variables dictated by acourt order.

In an embodiment, a user who is typically a member of law enforcement orofficer of the court 70 will access a database that contains recordsdescribing the court orders currently active in the system 72. Thedatabase 72 contains not only currently active orders, but permits auser to create new orders, edit or modify existing orders, or archiveorders that have expired. In this embodiment, the user may input detailsrequired for the enforcement of the court order 74, such details mayinclude the limitations and restrictions of the court order, theperson/s 76 who shall be wearing a tracking device 78 and identifyingthe offender/Defendant and victim/s/Plaintiff that are involved with thecourt order, the date the order was issued, the date it will expire anddetails of the jurisdiction it is assigned in 72. 74 provides the maindetails of which the predictive policing tool will establish thethresholds of which will be continuously monitored providing what istechnically known as a geo-fence. The database 74 references informationof each person assigned in the court order 76 with many necessarydetails including but not limited the following: their full name,aliases, data and place of birth, Driver's licenses, identificationnumber, home address, contact information. Job/s with address andcontact phone number, past criminal record to aid and any other courtrequired information necessary to enforce the orders. The database 78contains the data that associates the tracking devices with who/what isassigned to wear a tracking device in the order 74. 78 contains detailsincluding but not limited to the devices IP number, network accessnumber, make, model and serial number of the device, imei (unique numberfor any cellular device), the pings required to communicate to thenetwork and the person it will be assigned to 76. The person/s 76 mightnot necessarily be assigned to wear a tracking device however becausethey are associated with the court order their information is necessary.Tracking Ping database 80 provides information about the device 78associated with the time zones and time stamps of events and thelocations of where it is. The information from database 80 furnishesdetailed information in real-time and provides time-stamps of events. 80is the active portion of the predictive policing tool that provides theclock monitoring system that interfaces with the geo mapping tools inthe network establishing a geo-fencing buffer that generates alerts tothe legal authorities and those that are assigned to receive alerts forintervention and to the Audit Log 82. The audit log database providesarchived detail reports of the events that have occurred that areaccessed by the legal authorities and courts only 70.

The embodiment of FIG. 6 is the Architecture of the present inventionmonitoring systems network with tracking devices and the mobile virtualprivate network. The Architecture features the basic tools necessary tooperate the monitoring system and the predictive policing tools. TheFront End 14 is a computer type system that provides the interface forthe users to operate with. The Operating System Graphical Interface(OSGI) 84 is a service mix that is similar to Apache; it incorporatesthe processing that occurs in the back-end of the system. TheApplication Programming Interface (API) 86 is necessary to interface thefrontend to the OSGI and any other external devices that might benecessary to monitor with. The API 86 provides the interface connectionlinked directly to the Services 88 which contains the details generatedfrom the databases in FIG. 5 and the details generated from theProcessors 90. The Processor 90 provides the components to activelyprocess all the information in real-time that communicates with thetracker/s 20/22/25 which the Processor 90 will provide the details ofthis information back to the services 88 which will then be analyzed andprocessed for appropriate actions. The Services 88 processes theinformation to the DAO 92. The DAO 92 is responsible for handling of thedata before it is sent to the databases it is assigned to, DAO 92 is anobject that provides an abstract interface to some type of database orother persistence mechanism. By mapping application calls to thepersistence layer, DAO provide some specific data operations withoutexposing details of the database. The Database 94 manages all thedetails defined in FIG. 5. FIG. 5 Is the Data Structure displaying thetables used to define the data that is necessary to perform predictivepolicing by collecting the necessary data to provide a means forreal-time intervention of crimes and enforcing court orders.

In a non-limiting example, a clerk of court of a particular jurisdictioncould input a protective order into the database, and capture all of theinformation required to identify the offender, the victim and enter thisrecord into the database for later review and processing. The person/sinvolved in a court order will wear the tracking devices and if anydetails of the order are violated or the tracking devices losecommunication with the network or are tampered with, simultaneously areal-time detailed alert is sent to the authorities so they mayintervene and to the victims so they may seek safety. Alsosimultaneously, a report with time-stamped details is generated toprovide evidence to be used in court to enforce the order.

In a non-limiting example, a court order might only monitor one person,such as someone who is on parole.

In a non-limiting example the embodiment of the Data Base can be usedfor other applications than the court order process demonstratedallowing entities and assets to be tracked, monitored and alerts be sentwhen thresholds are met.

In a non-limiting example the tracking ping database will provide theactivities of the tracking devices with details such as thelongitude/latitude with appropriate time stamps.

In a non-limiting example the predictive policing of the networkcollects associates the data that is entered in from the court orderwith activities that the tracking devices are involved in. The databasewill be able to determine the intentions of the movement of the entitywearing the tracking devices based on their behavior patterns and ifthey make continued movement toward an entity they are to restrain fromor if they divert. The Predictive policing tool will automatically sendout notices if the thresholds appear to be met and the pings willincrease, if it appears the intent is to violate the order then the toolwill send out the proper alerts notifying the victim and authoritieswith the proper details and generate a report.

In a non-limiting example the mobile virtual private network isstand-alone but can be used in conjunction with the network or as asubstitute of the network if the communications link is down orindependent to provide the ability to privately and actively monitortracking devices without the need of wireless signals produces by thecellular providers. It can be used as a back-up network for themonitoring system or as its own for remote locations.

What is claimed is:
 1. A tracking system for monitoring an entity comprising: one or more primary tracking apparatuses carried by a first entity, the primary tracking apparatus including one or more sensors; one or more secondary tracking apparatuses carried by a second entity; the secondary apparatus including on or more sensors; a tracking system including a monitoring and reporting device, a storage device and a network; the tracking apparatuses having one or more signal transmitting technologies to communicate with the network through a wireless communications network, the tracking apparatuses having a local communications network to communicate with each other; the monitoring and reporting device used for monitoring in real-time one or more variables collected from the tracking apparatuses through the network, the monitoring and reporting device further used for sending one or more reports regarding the status of the variable to one or more authorities through the network, the monitoring and reporting device further capable of saving the reports to the storage device; and one or more alert systems installed on at least one of the tracking apparatuses.
 2. The tracking system of claim 1 wherein the local communications network transmits information over an associated radio frequency, the associated radio frequency used for measuring a distance between the primary and secondary tracking apparatuses, and the alert system signals an alert when the distance between the primary and secondary tracking apparatuses are within a predetermined distance from each other.
 3. The tracking system of claim 1 wherein the alert systems signal an alert to at least one of the tracking apparatuses.
 4. The tracking system of claim 1 wherein the alert systems signal an alert to the tracking system through the wireless communications network.
 5. The tracking system of claim 1 wherein the secondary tracking apparatus is placed at a location.
 6. The tracking system of claim 1 wherein the one or more sensors can detect the variables selected from one or more of the following group: moisture types, moisture levels, body temperature, environment temperature, heart rate, audio, water levels, motion detection, blood type of carrier, light levels and vitals.
 7. The tracking system of claim 1 wherein the sensor further includes programming containing the entity's medical records and vital records used to pre-establish one or more thresholds, and the alert system sending an alert to the network when the sensor detects that the one or more variables are not within the one or more pre-established thresholds.
 8. The tracking system of claim 7 wherein the network transmits a real-time alert to one or more authorities after receiving the alert.
 9. The tracking system of claim 7 wherein the network transmits a real-time alert to the one or more secondary tracking apparatuses.
 10. The tracking system of claim 1 wherein the signal transmitting technology is selected from the group comprising: cellular, GPS, CDMA, LTE, Wi-Fi, Bluetooth, radio, RFID satellite and signals derived from technology being evolved and not yet on the market.
 11. The tracking system of claim 1 wherein the tracking apparatuses communicate through the local communications network using Bluetooth, radio or RFID and technologies being evolved and not yet on the market.
 12. The tracking system of claim 1 wherein the alert system emits an electronic shock to the entity carrying one of the primary tracking apparatuses when the primary and secondary tracking apparatuses are within a pre-determined distance from each other, electronic shock is triggered to the primary apparatuses by an authority with remote access transmitting a signal through the network.
 13. The tracking system of claim 1 wherein the alert system is triggered when the entity carrying the primary tracking apparatus no longer carries the primary tracking apparatus, or when the primary apparatus loses communication with the monitoring network system.
 14. The tracking system of claim 1 wherein the variable includes pre-defined geographical locations and/or is the entities' locations.
 15. The tracking system of claim 1 wherein the monitoring and reporting device further includes a geographical mapping tool for real-time location monitoring and reporting of the tracking apparatuses.
 16. The tracking system of claim 1 further including a mobile network that monitors one or more variables collected from the primary and secondary tracking apparatuses, the mobile network sending the one or more variables collected to the network.
 17. The tracking system of claim 1 wherein the network is a mobile network capable of privately monitoring the primary and secondary tracking apparatuses.
 18. The tracking system of claim 1 wherein the first entity is an asset and the second entity is the owner of the asset.
 19. A method for tracking an entity named in a court order comprising the steps of: placing a primary tracking apparatus on the entity, who is identified as an offender, placing a secondary tracking apparatus on a victim, monitoring locations of the primary and secondary tracking apparatuses using a tracking system having a network, measuring a distance between the primary and secondary tracking apparatuses using a local communications network between the primary and secondary tracking apparatuses, and sending an alert when the locations of the tracking apparatuses are within a defined distance, when the distance between the tracking apparatuses are within a defined distance, or when one of the tracking apparatuses indicates that it has been tampered with.
 20. The method of claim 19 wherein the tracking apparatus indicates that it has been tampered with by: measuring one or more vital signs of the offender using the tracking apparatus, or measuring one or more environmental conditions of the tracking apparatus; comparing the measured vital signs or environmental conditions with one or more pre-defined thresholds; sending a signal indicating that one or more of the measured vital signs is outside of the pre-defined thresholds. 