Law enforcement interaction system

ABSTRACT

The law enforcement interaction system is a subscription based communication system. The law enforcement interaction system establishes a plurality of authenticated communication links between a subscriber, an appropriate authority, a data management authority, and a supervisory authority. The law enforcement interaction system deescalates the tension between the safety concerns of the appropriate authority the natural suspicions of the subscriber. Each of the plurality of authenticated communication links allows the subscriber, an appropriate authority, and a supervisory authority to exchange authenticated information through the data management authority. By exchanging authenticated information through the data management authority, the subscriber and the appropriate authority remain physically separated by remaining in their respective vehicles. The law enforcement interaction system is a process that comprises a method to establish the communication links and perform subscriber authentication, a method to document the transaction, and a method to terminate the communication links.

CROSS REFERENCES TO RELATED APPLICATIONS

Not Applicable

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH

Not Applicable

REFERENCE TO APPENDIX

Not Applicable

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates to the field of electric communicationtechniques and wireless communication networks, more specifically, anetwork management method for locating network equipment with additionalinformation processing. (H04W64/006)

SUMMARY OF INVENTION

The law enforcement interaction system is a subscription basedcommunication system. The law enforcement interaction system establishesa plurality of authenticated communication links between a subscriber,an appropriate authority, a data management authority, and a supervisoryauthority. The scenario of use for the law enforcement interactionsystem is represented by a traffic stop. Specifically, this disclosureassumes that a subscriber in a first vehicle has been stopped by anappropriate authority for a reasonable articulable suspicion. Theappropriate authority is assumed to be in a second vehicle. The lawenforcement interaction system deescalates the tension between thesafety concerns of the appropriate authority the natural suspicions ofthe subscriber. Each of the plurality of authenticated communicationlinks allows the subscriber, an appropriate authority, and a supervisoryauthority to exchange authenticated information through the datamanagement authority. By exchanging authenticated information throughthe data management authority, the subscriber and the appropriateauthority remain physically separated by remaining in their respectivevehicles. The law enforcement interaction system is a process thatcomprises a method to establish the communication links and performsubscriber authentication, a method to document the transaction, and amethod to terminate the communication links.

These together with additional objects, features and advantages of thelaw enforcement interaction system will be readily apparent to those ofordinary skill in the art upon reading the following detaileddescription of the presently preferred, but nonetheless illustrative,embodiments when taken in conjunction with the accompanying drawings.

In this respect, before explaining the current embodiments of the lawenforcement interaction system in detail, it is to be understood thatthe law enforcement interaction system is not limited in itsapplications to the details of construction and arrangements of thecomponents set forth in the following description or illustration. Thoseskilled in the art will appreciate that the concept of this disclosuremay be readily utilized as a basis for the design of other structures,methods, and systems for carrying out the several purposes of the lawenforcement interaction system.

It is therefore important that the claims be regarded as including suchequivalent construction insofar as they do not depart from the spiritand scope of the law enforcement interaction system. It is also to beunderstood that the phraseology and terminology employed herein are forpurposes of description and should not be regarded as limiting.

BRIEF DESCRIPTION OF DRAWINGS

The accompanying drawings, which are included to provide a furtherunderstanding of the invention are incorporated in and constitute a partof this specification, illustrate an embodiment of the invention andtogether with the description serve to explain the principles of theinvention. They are meant to be exemplary illustrations provided toenable persons skilled in the art to practice the disclosure and are notintended to limit the scope of the appended claims.

FIG. 1 is an in-use view of an embodiment of the disclosure.

FIG. 2 is a block diagram or schematic view of an embodiment of thedisclosure.

FIG. 3A is a flow diagram of an embodiment of the disclosure.

FIG. 3B is a flow diagram of an embodiment of the disclosure.

FIG. 3C is a flow diagram of an embodiment of the disclosure.

FIG. 4 is a flow diagram of an embodiment of the disclosure.

FIG. 5 is a flow diagram of an embodiment of the disclosure.

DETAILED DESCRIPTION OF THE EMBODIMENT

The following detailed description is merely exemplary in nature and isnot intended to limit the described embodiments of the application anduses of the described embodiments. As used herein, the word “exemplary”or “illustrative” means “serving as an example, instance, orillustration.” Any implementation described herein as “exemplary” or“illustrative” is not necessarily to be construed as preferred oradvantageous over other implementations. All of the implementationsdescribed below are exemplary implementations provided to enable personsskilled in the art to practice the disclosure and are not intended tolimit the scope of the appended claims. Furthermore, there is nointention to be bound by any expressed or implied theory presented inthe preceding technical field, background, brief summary or thefollowing detailed description.

Detailed reference will now be made to one or more potential embodimentsof the disclosure, which are illustrated in FIGS. 1 through 5.

The law enforcement interaction system 100 (hereinafter invention) is asubscription-based communication system. The invention 100 establishes aplurality of authenticated communication links between a subscriber 101,an appropriate authority 102, a data management authority 103, and asupervisory authority. The scenario of use for the invention isrepresented by a traffic stop. Specifically, this disclosure assumesthat a subscriber 101 in a first vehicle 105 has been stopped by anappropriate authority 102 for a reasonable articulable suspicion. Theappropriate authority 102 is assumed to be in a second vehicle 107. Theinvention 100 deescalates the tension between the safety concerns of theappropriate authority 102 the natural suspicions of the subscriber 101.Each of the plurality of authenticated communication links allows thesubscriber 101, an appropriate authority 102, and a supervisoryauthority to exchange authenticated information through the datamanagement authority 103. By exchanging authenticated informationthrough the data management authority 103, the subscriber 101 and theappropriate authority 102 remain physically separated by remaining intheir respective vehicles. The invention 100 is a process that comprisesa method to establish the communication links and perform subscriber 101authentication, a method to document the transaction, and a method toterminate the communication links.

This disclosure assumes that the first vehicle 105 further comprises avisible registration number 106.

The subscriber 101 further comprises a subscriber 101 personal datadevice 201. The subscriber 101 personal data device 201 is aprogrammable electrical device that provides data management andcommunication services through one or more functions referred to as asubscriber 101 application 114. The subscriber 101 application 114 is aset of logical operating instructions that are performed by thesubscriber 101 personal data device 201. The addition of a subscriber101 application 114 will provide increased functionality for thesubscriber 101 personal data device 201. This disclosure assumes that asubscriber 101 application 114 exists for the purpose of interactingwith the invention 100. Methods to design and implement a subscriber 101application 114 on a subscriber 101 personal data device 201 are wellknown and documented in the electrical arts.

The subscriber 101 personal data device 201 further comprises asubscriber 101 video module 211, a subscriber 101 GPS module 212, asubscriber 101 biometric sensor 213, and a subscriber 101 application114.

The subscriber 101 video module 211 is an electronic device. Thesubscriber 101 video module 211 transmits and receives video and audioof the interior of the first vehicle which generates a subscriber 101video communication link 111 with the data management authority 103.

The subscriber 101 GPS module 212 is an electrical device thatcommunicates with the GPS to determine the GPS coordinates of thesubscriber 101 GPS module 212. When queried by the subscriber 101personal data device 201, the subscriber 101 GPS module 212 transfersthe GPS coordinates to the subscriber 101 personal data device 201. Thesubscriber 101 GPS module 212 generates a subscriber 101 GPS coordinates112 used to authenticate the location of the subscriber 101.

The subscriber 101 biometric sensor 213 is an electronic device. Thesubscriber 101 biometric sensor 213 generates the subscriber 101biometric authentication 113 for the supervisory authority 104 beforethe supervisory authority 104 establishes the plurality of communicationbridges. The use of a subscriber 101 biometric sensor 213 for thispurpose is well-known and documented in the electrical and securityarts.

The appropriate authority 102 further comprises an appropriate authority102 personal data device 202. The appropriate authority 102 personaldata device 202 is a programmable electrical device that provides datamanagement and communication services through one or more functionsreferred to as an appropriate authority 102 application. The appropriateauthority 102 application is a set of logical operating instructionsthat are performed by the appropriate authority 102 personal data device202. The addition of an appropriate authority 102 application willprovide increased functionality for the appropriate authority 102personal data device 202. This disclosure assumes that an appropriateauthority 102 application exists for the purpose of interacting with theinvention 100. Methods to design and implement an appropriate authority102 application on an appropriate authority 102 personal data device 202are well known and documented in the electrical arts.

The appropriate authority 102 personal data device 202 further comprisesan appropriate authority 102 video module 221 and an appropriateauthority 102 GPS module 222.

The appropriate authority 102 video module 221 is an electronic device.The appropriate authority 102 video module 221 transmits and receivesvideo and audio of the interior of the second vehicle 107 whichgenerates the appropriate authority 102 first video communication link121 and the appropriate authority 102 second video communication link123 with the data management authority 103.

The appropriate authority 102 GPS module 222 is an electrical devicethat communicates with the GPS to determine the GPS coordinates of theappropriate authority 102 GPS module 222. When queried by theappropriate authority 102 personal data device 202, the appropriateauthority 102 GPS module 222 transfers the GPS coordinates to theappropriate authority 102 personal data device 202. The appropriateauthority 102 GPS module 222 generates the appropriate authority 102 GPScoordinates 122 used to authenticate the location of the appropriateauthority 102.

The data management authority 103 manages the subscriber 101 information131 and a plurality of communication bridges. The supervisory authority104 maintains a continuous communication link between the datamanagement authority 103 and the supervisory authority 104 that isreferred to as the supervisory authority 104 video communication link141.

The method to establish the communication links and perform subscriber101 authentication 181 is a method that establishes a two-way bridgebetween the subscriber 101 video communication link 111 and theappropriate authority 102 first video communication link 121 afterconfirmation of the identification of the subscriber 101. The method toestablish the communication links and perform subscriber 101authentication comprises a first action 301, a second action 302, athird action 303, a fourth action 304, a fifth action 305, a sixthaction 306, a seventh action 307, an eighth action 308, a ninth action309, a tenth action 310, an eleventh action 311, a twelfth action 312, athirteenth action 313, a fourteenth action 314, a fifteenth action 315,a sixteenth action 316, a seventeenth action 317, an eighteenth action318, a nineteenth action 319, a twentieth action 320, a twenty-firstaction 321, a twenty-second action 322, and a twenty-third action 323.

As shown most clearly in FIGS. 3a, 3b, and 3c , the following tenparagraphs describe the method to establish the communication links andperform subscriber 101 authentication 181.

The appropriate authority 102 takes the first action 301 to pull over afirst vehicle 105 on the basis of the appropriate authority's 102reasonable articulable suspicion 124. The appropriate authority 102takes the second action 302 to collect the visible registration number106 of the first vehicle. The appropriate authority 102 takes the thirdaction 303 to transmit the visible registration number 106, theappropriate authority 102 gaps coordinates 122, and the appropriateauthority's 102 reasonable articulable suspicion 124 to the datamanagement authority 103.

The data management authority 103 takes the fourth action 304 to processthe visible registration number 106 to determine if the vehicle 105 isregistered to a subscriber 101. If the vehicle 105 is not registered toa subscriber 101, the data management authority 103 takes the fifthaction 305 to inform the appropriate authority 102 to proceed with anappropriate alternate procedure 125. If the vehicle 105 is registered toa subscriber 101, the data management authority 103 takes the sixthaction 306 to retrieve the stored subscriber 101 information 131. Thesubscriber 101 information 131 includes the driver's license information151, the driver's license image 152, the personal data device contactinformation 153, the biometric validation information 154, and asubscriber 101 duress word 155.

The data management authority 103 further takes the seventh action 307to implement a procedure to directly contact the subscriber 101application 114 on the subscriber 101 personal data device 115. If thedata management authority 103 does not receive a response from thesubscriber 101 application 114 on the subscriber 101 personal datadevice 115, the data management authority 103 takes the eighth action308 to send an SMS message directly to the subscriber 101 personal datadevice 115 requesting that the subscriber 101 activate the subscriber101 application 114 on the subscriber 101 personal data device 115. Ifthe data management authority 103 determines that the subscriber 101application 114 on the subscriber 101 personal data device 115 has notbeen activated, the data management authority 103 takes the ninth action309 to inform the appropriate authority 102 to proceed with theappropriate alternate procedure 125.

Once the data management authority 103 determines that the subscriber101 application 114 on the subscriber 101 personal data device 115 isactivated, the data management authority 103 takes the tenth action 310to request the subscriber 101 GPS coordinates 112 and the subscriber 101biometric authentication from the subscriber 101.

If the data management authority 103 determines that the subscriber 101biometric authentication 113 or the subscriber 101 GPS coordinates 112is invalid or has not been received, the data management authority 103takes the eleventh action 311 to inform the appropriate authority 102 toproceed with the appropriate alternate procedure 125. If the datamanagement authority 103 determines that the subscriber 101 biometricauthentication 113 is valid, the data management authority 103 takes thetwelfth action 312 to compare the subscriber 101 GPS coordinates 112 tothe appropriate authority 102 GPS coordinates 122.

If the data management authority 103 determines that the subscriber 101GPS coordinates 112 and the appropriate authority GPS coordinates 122are not at the same location, the data management authority 103 takesthe thirteenth action 313 to inform the appropriate authority 102 toproceed with the appropriate alternate procedure 125. If the datamanagement authority 103 determines that the subscriber 101 GPScoordinates and the appropriate authority 102 GPS coordinates 122 are atthe same location, the data management authority 103 takes thefourteenth action 314 to request subscriber 101 permission to open thesubscriber 101 video communication link 111. If the subscriber 101refuses permission, the data management authority takes the fifteenthaction 315 to inform the appropriate authority 102 to proceed with theappropriate alternate procedure 125.

If the subscriber 101 grants permission, the data management authority103 takes the sixteenth action 316 to open the subscriber 101 videocommunication link 111 and transmits the subscriber 101 information 131as well as the subscriber 101 duress word 155 to the appropriateauthority 102.

The data management authority 103 further takes the seventeenth action317 to provide the subscriber 101 with the identity of the appropriateauthority 102 and the appropriate authority's 102 reasonable articulablesuspicion 124. The data management authority 103 further takes theeighteenth action 318 to open the appropriate authority 102 first videocommunication link 121, the appropriate authority 102 second videocommunication link 123, and the supervisory authority 104 videocommunication link 141.

The data management authority 103 further takes the nineteenth action319 to create a two-way bridge between the subscriber 101 videocommunication link 111 and the appropriate authority 102 first videocommunication link 121. The data management authority 103 further takesthe twentieth action 320 to create a two-way bridge between thesupervisory authority 104 video communication link 141 and theappropriate authority 102 second video communication link 123. The datamanagement authority 103 further takes the twenty-first action 321 tocreate a one-way bridge between the subscriber 101 video communicationlink 111 and the supervisory authority 104 video communication link 141.

The appropriate authority 102 further takes the twenty-second action 322to then communicate directly with the subscriber 101 according to thespecific processing procedures that apply to the appropriate authority's102 reasonable articulable suspicion 124. At the conclusion of theappropriate procedures, the appropriate authority 102 takes thetwenty-third action 323 to prepare documentation 171 of the interactionbetween the subscriber 101 and the appropriate authority 102.

The method to document the transaction 182 is a method that allows forthe transmittal of documentation between the appropriate authority 102and the subscriber 101. The method to document the transaction 182comprises a twenty-fourth action 324, a twenty-fifth action 325, atwenty-sixth action 326, and a twenty-seventh action 327.

As shown most clearly in FIG. 4, this paragraph describes the method todocument the transaction 182. The appropriate authority 102 takes thetwenty-fourth action 324 to transmit the documentation 171 of theinteraction to the data management authority 103. The data managementauthority 103 takes the twenty-fifth action 325 to request permissionfrom the subscriber 101 to transmit the documentation 171 of theinteraction directly to the subscriber 101. If the subscriber 101refuses permission, the data management authority 103 takes thetwenty-sixth action 326 to inform the appropriate authority to proceedwith the appropriate alternate procedure 125. If the subscriber 101grants permission, the data management authority 103 takes thetwenty-seventh action 327 to transmit the documentation 171 of theinteraction to the subscriber 101.

The method to terminate the communication links 183 is a method thatcloses down the two-way bridge between the subscriber 101 videocommunication link 111 and the appropriate authority 102 first videocommunication link 121 after the transaction between the appropriateauthority 102 and the subscriber 101 has been completed. The method toterminate the communication links 183 comprises a twenty-eighth action328 and a twenty-ninth action 329.

As shown most clearly in FIG. 5, this paragraph describes the method toterminate the communication links 183. After an opportunity is providedto the subscriber 101 to review the documentation of the interactionwith the appropriate authority 102, the data management authority 103takes the twenty-eighth action 328 to terminate the interaction.Specifically, the data management authority 103: takes the twenty-ninthaction 329 to: a) terminate the two way bridge between the subscriber101 video communication link 111 and the appropriate authority 102 firstvideo communication link 121; b) terminate the one way bridge betweenthe subscriber 101 video communication link 111 and the supervisoryauthority 104 video communication link 141; and, c) terminate the twoway bridge between the supervisory authority 104 video communicationlink 141 and the appropriate authority 102 second video communicationlink 123 after a debriefing period between the supervisory authority 104and the appropriate authority 102.

The following definitions were used in this disclosure:

Appropriate Authority: As used in this disclosure, an appropriateauthority is a previously determined person or organization that isdesignated to monitor compliance with, and if necessary enforce,regulatory and legal mandates.

Biometric Device: As used in this disclosure, a biometric device is asecurity device that identifies an individual through the use of aunique and measurable physiological characteristic of the individual.Typical unique and measurable physiological characteristic include, butare not limited to, fingerprints, DNA, or retina of the eye.

Cable: As used in this disclosure, a cable is a collection of insulatedwires covered by a protective casing that is used for transmittingelectricity or telecommunication signals.

Commercially Provided And Publicly Available Cellular Wireless Network:As used in this disclosure, a commercially provided and publiclyavailable cellular wireless network refers to subscription-basedpublically available wireless network commonly used to provide wirelesscommunication access for personal data devices. The commerciallyprovided and publicly available cellular wireless network will typicallyprovide voice communication, data communication services, and SMS andMMS messaging services. The commercially provided and publicly availablecellular wireless network is commonly referred to as the cellularnetwork. The commercially provided and publicly available cellularwireless network is abbreviated as the PPWN.

Database: As used in this disclosure, a database refers to: 1) a set ofdata that is organized and stored in a manner that allows for the searchand retrieval of data from the data set; or, 2) the electronic devicethat stores and organizes a data set as described in the firstdefinition.

GPS: As used in this disclosure, and depending on the context, GPSrefers to: 1) a system of navigational satellites that are used todetermine the position and velocity of a person or object; 2) the systemof navigational satellites referred to in the first definition that areused to synchronize to global time; or, 3) an electronic device or thatuses the system of navigational satellites referred to in the firstdefinition to determine the position of a person or object. GPS is anacronym for Global Positioning System.

Hardwired: As used in this disclosure, the term hardwired refers to aphysical electrical connection, generally using cable, between twoelectrical circuits or circuit elements. Such a hardwired connection isconsidered more reliable than a wireless connection.

Logical Device: As used in this disclosure, a logical device is aprogrammable electrical device that processes externally provided inputsto generate outputs that are determined from a previously programmed setof instructions.

PDD: As used in this disclosure, PDD is an acronym for a personal datadevice.

Personal Data Device: As used in this disclosure, a personal data deviceis a handheld logical device that is used for managing personalinformation and communication. Examples of personal data device include,but are not limited to, cellular phones, tablets, and smartphones. Seelogical device

PPWN: As used in this disclosure, the PPWN is an acronym for apublically provided wireless network. The PPWN refers to a commerciallyprovided and publicly available cellular wireless network.

SMS: As used in this disclosure, SMS is an abbreviation for shortmessage service. The short message service is a service that is oftenprovided with the cellular services that support personal data devices.Specifically, the SMS allows for the exchange of written messagesbetween personal data devices. The SMS is commonly referred to as textmessaging. A common enhancement of SMS is the inclusion of the deliveryof multimedia services. This enhanced service is often referred to asMultimedia Media Services which is abbreviated as MMS.

Supervisory: As used in this disclosure, supervisory describes arelationship between a first object and a second object wherein thefunction of the first object is limited to initiating and monitoring theactions or activity of the second object. The first object is said tosupervise the second object.

Supervisory Authority: As used in this disclosure, a supervisoryauthority describes a supervisory relationship between an appropriateauthority and a supervisory authority wherein the supervisory authority:a) monitors the activities of the appropriate authority; and, b)provides information to the appropriate authority that is relevant tothe activities of the appropriate authority.

Wireless: As used in this disclosure, wireless is an adjective that isused to describe a communication channel between two devices that doesnot require the use of physical cabling.

With respect to the above description, it is to be realized that theoptimum dimensional relationship for the various components of theinvention described above and in FIGS. 1 through 5 include variations insize, materials, shape, form, function, and manner of operation,assembly and use, are deemed readily apparent and obvious to one skilledin the art, and all equivalent relationships to those illustrated in thedrawings and described in the specification are intended to beencompassed by the invention.

It shall be noted that those skilled in the art will readily recognizenumerous adaptations and modifications which can be made to the variousembodiments of the present invention which will result in an improvedinvention, yet all of which will fall within the spirit and scope of thepresent invention as defined in the following claims. Accordingly, theinvention is to be limited only by the scope of the following claims andtheir equivalents.

What is claimed is:
 1. A law enforcement interaction method comprising:a method to establish communication links and perform subscriberauthentication, a method to document the transaction, and a method toterminate the communication links; wherein the law enforcementinteraction method is a subscription-based communication system; whereinthe law enforcement interaction method establishes a plurality ofauthenticated communication links between a subscriber, an appropriateauthority, a data management authority, and a supervisory authority;wherein each of the plurality of authenticated communication linksallows the subscriber, the appropriate authority, and the supervisoryauthority to exchange authenticated information through the datamanagement authority; wherein by exchanging authenticated informationthrough the data management authority, the subscriber and theappropriate authority remain physically separated by remaining in theirrespective vehicles; wherein the method to establish the communicationlinks and perform subscriber authentication is a method that establishesa two-way bridge between the subscriber video communication link and theappropriate authority first video communication link after confirmationof the identification of the subscriber; wherein the subscriber furthercomprises a subscriber personal data device; wherein the appropriateauthority further comprises an appropriate authority personal datadevice; wherein the subscriber personal data device further comprises asubscriber video module, a subscriber GPS module, a subscriber biometricsensor, and a subscriber application; wherein the appropriate authoritypersonal data device further comprises an appropriate authority videomodule and an appropriate authority GPS module; wherein the method toestablish the communication links and perform subscriber authenticationcomprises a first action, a second action, a third action, a fourthaction, a fifth action, a sixth action, a seventh action, an eighthaction, a ninth action, a tenth action, an eleventh action, a twelfthaction, a thirteenth action, a fourteenth action, a fifteenth action, asixteenth action, a seventeenth action, an eighteenth action, anineteenth action, a twentieth action, a twenty-first action, atwenty-second action, and a twenty-third action.
 2. The law enforcementinteraction method according to claim 1 wherein the subscriber in afirst vehicle has been stopped by an appropriate authority for areasonable articulable suspicion; wherein the first vehicle furthercomprises a visible registration number; wherein the appropriateauthority is in a second vehicle; wherein the subscriber furthercomprises a subscriber personal data device.
 3. The law enforcementinteraction method according to claim 2 wherein the method to documentthe transaction is a method that allows for the transmittal ofdocumentation between the appropriate authority and the subscriber. 4.The law enforcement interaction method according to claim 3 wherein themethod to terminate the communication links is a method that closes downthe two-way bridge between the subscriber video communication link andthe appropriate authority first video communication link after thetransaction between the appropriate authority and the subscriber hasbeen completed.
 5. The law enforcement interaction method according toclaim 4 wherein the appropriate authority takes the first action to pullover a first vehicle on the basis of the appropriate authority'sreasonable articulable suspicion; wherein the appropriate authoritytakes the second action to collect the visible registration number ofthe first vehicle; wherein the appropriate authority takes the thirdaction to transmit the visible registration number, the appropriateauthority gaps coordinates, and the appropriate authority's reasonablearticulable suspicion to the data management authority; wherein the datamanagement authority takes the fourth action to process the visibleregistration number to determine if the vehicle is registered to asubscriber; wherein if the vehicle is not registered to a subscriber,the data management authority takes the fifth action to inform theappropriate authority to proceed with an appropriate alternateprocedure; wherein if the vehicle is registered to a subscriber, thedata management authority takes the sixth action to retrieve the storedsubscriber information; wherein the subscriber information includes thedriver's license information, the driver's license image, the personaldata device contact information, the biometric validation information,and a subscriber duress word; wherein the data management authorityfurther takes the seventh action to implement a procedure to directlycontact the subscriber application on the subscriber personal datadevice; wherein if the data management authority does not receive aresponse from the subscriber application on the subscriber personal datadevice, the data management authority takes the eighth action to send anSMS message directly to the subscriber personal data device requestingthat the subscriber activate the subscriber application on thesubscriber personal data device; wherein if the data managementauthority determines that the subscriber application on the subscriberpersonal data device has not been activated, the data managementauthority takes the ninth action to inform the appropriate authority toproceed with the appropriate alternate procedure; wherein once the datamanagement authority determines that the subscriber application on thesubscriber personal data device is activated, the data managementauthority takes the tenth action to request the subscriber GPScoordinates and the subscriber biometric authentication from thesubscriber; wherein if the data management authority determines that thesubscriber biometric authentication or the subscriber GPS coordinates isinvalid or has not been received, the data management authority takesthe eleventh action to inform the appropriate authority to proceed withthe appropriate alternate procedure; wherein if the data managementauthority determines that the subscriber biometric authentication isvalid, the data management authority takes the twelfth action to comparethe subscriber GPS coordinates to the appropriate authority GPScoordinates; wherein if the data management authority determines thatthe subscriber GPS coordinates and the appropriate authority GPScoordinates are not at the same location, the data management authoritytakes the thirteenth action to inform the appropriate authority toproceed with the appropriate alternate procedure; wherein if the datamanagement authority determines that the subscriber GPS coordinates andthe appropriate authority GPS coordinates are at the same location, thedata management authority takes the fourteenth action to requestsubscriber permission to open the subscriber video communication link;wherein if the subscriber refuses permission, the data managementauthority takes the fifteenth action to inform the appropriate authorityto proceed with the appropriate alternate procedure; wherein if thesubscriber grants permission, the data management authority takes thesixteenth action to open the subscriber video communication link andtransmits the subscriber information as well as the subscriber duressword to the appropriate authority; wherein the data management authorityfurther takes the seventeenth action to provide the subscriber with theidentity of the appropriate authority and the appropriate authority'sreasonable articulable suspicion; wherein the data management authorityfurther takes the eighteenth action to open the appropriate authorityfirst video communication link, the appropriate authority second videocommunication link, and the supervisory authority video communicationlink; wherein the data management authority further takes the nineteenthaction to create a two-way bridge between the subscriber videocommunication link and the appropriate authority first videocommunication link; wherein the data management authority further takesthe twentieth action to create a two-way bridge between the supervisoryauthority video communication link and the appropriate authority secondvideo communication link; wherein the data management authority furthertakes the twenty-first action to create a one-way bridge between thesubscriber video communication link and the supervisory authority videocommunication link; wherein the appropriate authority further takes thetwenty-second action to then communicate directly with the subscriberaccording to the specific processing procedures that apply to theappropriate authority's reasonable articulable suspicion; wherein theappropriate authority takes the twenty-third action to preparedocumentation of the interaction between the subscriber and theappropriate authority.
 6. The law enforcement interaction methodaccording to claim 5 wherein the method to document the transactioncomprises a twenty-fourth action, a twenty-fifth action, a twenty-sixthaction, and a twenty-seventh action; wherein the appropriate authoritytakes the twenty-fourth action to transmit the documentation of theinteraction to the data management authority; wherein the datamanagement authority takes the twenty-fifth action to request permissionfrom the subscriber to transmit the documentation of the interactiondirectly to the subscriber; wherein if the subscriber refusespermission, the data management authority takes the twenty-sixth actionto inform the appropriate authority to proceed with the appropriatealternate procedure; wherein if the subscriber grants permission, thedata management authority takes the twenty-seventh action to transmitthe documentation of the interaction to the subscriber.
 7. The lawenforcement interaction method according to claim 6 wherein the methodto terminate the communication links comprises a twenty-eighth actionand a twenty-ninth action; wherein after an opportunity is provided tothe subscriber to review the documentation of the interaction with theappropriate authority, the data management authority takes thetwenty-eighth action to terminate the interaction; wherein the datamanagement authority: takes the twenty-ninth action to: a) terminate thetwo way bridge between the subscriber video communication link and theappropriate authority first video communication link; b) terminate theone way bridge between the subscriber video communication link and thesupervisory authority video communication link; and, c) terminate thetwo way bridge between the supervisory authority video communicationlink and the appropriate authority second video communication link aftera debriefing period between the supervisory authority and theappropriate authority.
 8. The law enforcement interaction methodaccording to claim 2 wherein the subscriber personal data device furthercomprises a subscriber video module, a subscriber GPS module, asubscriber biometric sensor, and a subscriber application; wherein thesubscriber video module is an electronic device; wherein the subscribervideo module transmits and receives video and audio; wherein thesubscriber GPS module is an electrical device that communicates with theGPS to determine the GPS coordinates of the subscriber GPS module;wherein when queried by the subscriber personal data device, thesubscriber GPS module transfers the GPS coordinates to the subscriberpersonal data device; wherein the subscriber GPS module generates asubscriber GPS coordinates; wherein the subscriber biometric sensor isan electronic device; wherein the subscriber biometric sensor generatesa subscriber biometric authentication for the supervisory authority. 9.The law enforcement interaction method according to claim 8 wherein theappropriate authority further comprises an appropriate authoritypersonal data device; wherein the appropriate authority personal datadevice is a programmable electrical device that provides data managementand communication services through one or more functions referred to asan appropriate authority application.
 10. The law enforcementinteraction method according to claim 9 wherein the appropriateauthority personal data device further comprises an appropriateauthority video module and an appropriate authority GPS module; whereinthe appropriate authority video module is an electronic device; whereinthe appropriate authority video module transmits and receives video andaudio of the interior of the second vehicle which generates theappropriate authority first video communication link and the appropriateauthority second video communication link with the data managementauthority; wherein the appropriate authority GPS module is an electricaldevice that communicates with the GPS to determine the GPS coordinatesof the appropriate authority GPS module; wherein when queried by theappropriate authority personal data device, the appropriate authorityGPS module transfers the GPS coordinates to the appropriate authoritypersonal data device; wherein the appropriate authority GPS modulegenerates the appropriate authority GPS coordinates used to authenticatethe location of the appropriate authority.
 11. The law enforcementinteraction method according to claim 10 wherein the method to establishthe communication links and perform subscriber authentication is amethod that establishes a two-way bridge between the subscriber videocommunication link and the appropriate authority first videocommunication link after confirmation of the identification of thesubscriber.
 12. The law enforcement interaction method according toclaim 11 wherein the method to document the transaction is a method thatallows for the transmittal of documentation between the appropriateauthority and the subscriber.
 13. The law enforcement interaction methodaccording to claim 12 wherein the method to terminate the communicationlinks is a method that closes down the two-way bridge between thesubscriber video communication link and the appropriate authority firstvideo communication link after the transaction between the appropriateauthority and the subscriber has been completed.
 14. The law enforcementinteraction method according to claim 13 wherein the data managementauthority manages the subscriber information and a plurality ofcommunication bridges; wherein the supervisory authority maintains acontinuous communication link between the data management authority andthe supervisory authority that is referred to as the supervisoryauthority video communication link.
 15. The law enforcement interactionmethod according to claim 14 wherein the method to establish thecommunication links and perform subscriber authentication comprises afirst action, a second action, a third action, a fourth action, a fifthaction, a sixth action, a seventh action, an eighth action, a ninthaction, a tenth action, an eleventh action, a twelfth action, athirteenth action, a fourteenth action, a fifteenth action, a sixteenthaction, a seventeenth action, an eighteenth action, a nineteenth action,a twentieth action, a twenty-first action, a twenty-second action, and atwenty-third action; wherein the appropriate authority takes the firstaction to pull over a first vehicle on the basis of the appropriateauthority's reasonable articulable suspicion; wherein the appropriateauthority takes the second action to collect the visible registrationnumber of the first vehicle; wherein the appropriate authority takes thethird action to transmit the visible registration number, theappropriate authority gaps coordinates, and the appropriate authority'sreasonable articulable suspicion to the data management authority;wherein the data management authority takes the fourth action to processthe visible registration number to determine if the vehicle isregistered to a subscriber; wherein if the vehicle is not registered toa subscriber, the data management authority takes the fifth action toinform the appropriate authority to proceed with an appropriatealternate procedure; wherein if the vehicle is registered to asubscriber, the data management authority takes the sixth action toretrieve the stored subscriber information; wherein the subscriberinformation includes the driver's license information, the driver'slicense image, the personal data device contact information, thebiometric validation information, and a subscriber duress word; whereinthe data management authority further takes the seventh action toimplement a procedure to directly contact the subscriber application onthe subscriber personal data device; wherein if the data managementauthority does not receive a response from the subscriber application onthe subscriber personal data device, the data management authority takesthe eighth action to send an SMS message directly to the subscriberpersonal data device requesting that the subscriber activate thesubscriber application on the subscriber personal data device; whereinif the data management authority determines that the subscriberapplication on the subscriber personal data device has not beenactivated, the data management authority takes the ninth action toinform the appropriate authority to proceed with the appropriatealternate procedure; wherein once the data management authoritydetermines that the subscriber application on the subscriber personaldata device is activated, the data management authority takes the tenthaction to request the subscriber GPS coordinates and the subscriberbiometric authentication from the subscriber; wherein if the datamanagement authority determines that the subscriber biometricauthentication or the subscriber GPS coordinates is invalid or has notbeen received, the data management authority takes the eleventh actionto inform the appropriate authority to proceed with the appropriatealternate procedure; wherein if the data management authority determinesthat the subscriber biometric authentication is valid, the datamanagement authority takes the twelfth action to compare the subscriberGPS coordinates to the appropriate authority GPS coordinates; wherein ifthe data management authority determines that the subscriber GPScoordinates and the appropriate authority GPS coordinates are not at thesame location, the data management authority takes the thirteenth actionto inform the appropriate authority to proceed with the appropriatealternate procedure; wherein if the data management authority determinesthat the subscriber GPS coordinates and the appropriate authority GPScoordinates are at the same location, the data management authoritytakes the fourteenth action to request subscriber permission to open thesubscriber video communication link; wherein if the subscriber refusespermission, the data management authority takes the fifteenth action toinform the appropriate authority to proceed with the appropriatealternate procedure; wherein if the subscriber grants permission, thedata management authority takes the sixteenth action to open thesubscriber video communication link and transmits the subscriberinformation as well as the subscriber duress word to the appropriateauthority; wherein the data management authority further takes theseventeenth action to provide the subscriber with the identity of theappropriate authority and the appropriate authority's reasonablearticulable suspicion; wherein the data management authority furthertakes the eighteenth action to open the appropriate authority firstvideo communication link, the appropriate authority second videocommunication link, and the supervisory authority video communicationlink; wherein the data management authority further takes the nineteenthaction to create a two-way bridge between the subscriber videocommunication link and the appropriate authority first videocommunication link; wherein the data management authority further takesthe twentieth action to create a two-way bridge between the supervisoryauthority video communication link and the appropriate authority secondvideo communication link; wherein the data management authority furthertakes the twenty-first action to create a one-way bridge between thesubscriber video communication link and the supervisory authority videocommunication link; wherein the appropriate authority further takes thetwenty-second action to then communicate directly with the subscriberaccording to the specific processing procedures that apply to theappropriate authority's reasonable articulable suspicion; wherein theappropriate authority takes the twenty-third action to preparedocumentation of the interaction between the subscriber and theappropriate authority.
 16. The law enforcement interaction methodaccording to claim 15 wherein the method to document the transactioncomprises a twenty-fourth action, a twenty-fifth action, a twenty-sixthaction, and a twenty-seventh action; wherein the appropriate authoritytakes the twenty-fourth action to transmit the documentation of theinteraction to the data management authority; wherein the datamanagement authority takes the twenty-fifth action to request permissionfrom the subscriber to transmit the documentation of the interactiondirectly to the subscriber; wherein if the subscriber refusespermission, the data management authority takes the twenty-sixth actionto inform the appropriate authority to proceed with the appropriatealternate procedure; wherein if the subscriber grants permission, thedata management authority takes the twenty-seventh action to transmitthe documentation of the interaction to the subscriber.
 17. The lawenforcement interaction method according to claim 16 wherein the methodto terminate the communication links comprises a twenty-eighth actionand a twenty-ninth action; wherein after an opportunity is provided tothe subscriber to review the documentation of the interaction with theappropriate authority, the data management authority takes thetwenty-eighth action to terminate the interaction; wherein the datamanagement authority: takes the twenty-ninth action to: a) terminate thetwo way bridge between the subscriber video communication link and theappropriate authority first video communication link; b) terminate theone way bridge between the subscriber video communication link and thesupervisory authority video communication link; and, c) terminate thetwo way bridge between the supervisory authority video communicationlink and the appropriate authority second video communication link aftera debriefing period between the supervisory authority and theappropriate authority.