System and method for monitoring a former convict of an intoxication-related offense

ABSTRACT

A system and method are disclosed for preventing a restricted individual from operating a motor vehicle. The system monitors a speed of the individual via a smart device associated with the individual. The system activates a monitoring function based on a detected speed of the device, which may evidence the individual riding in a motor vehicle. The system them verifies that the user of the device is the restricted individual through a variety of different identification methods. Once identified, the system accesses various data sources associated with one or more ride applications running on the smart device in order to determine whether the restricted individual has requested a ride from a third party during a relevant time period. After analyzing the data, a determination is made as to whether the individual is driving, or whether more information is needed.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/874,528, filed on Jan. 18, 2018, which is a continuation of U.S.patent application Ser. No. 15/657,935, filed on Jul. 24, 2017, whichare both incorporated by reference herein in their entirety.

BACKGROUND

Field

This disclosure relates to a system for allowing an offender to assistwith a booking process in order to streamline the booking process, aswell as to free up resources for officers to perform other more criticaltasks.

Background

Former detainees, who have been convicted of certainintoxication-related crimes, may be prohibited from operating a motorvehicle. Previously, there was no way to determine whether such anindividual was operating a motor vehicle, unless that individual waspulled over. Although the causes may vary for pulling over a motorist,there is a high likelihood that a former convict of anintoxication-related crime will be intoxicated again, and thus mayalready be intoxicated at the time of being stopped.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a diagram of an exemplary monitoring environmentaccording to embodiments of the present disclosure.

FIG. 2 illustrates a block diagram of an exemplary monitoring systemaccording to embodiments of the present disclosure.

FIG. 3 illustrates a block diagram of an exemplary monitoring system,according to embodiments of the present disclosure.

FIG. 4 illustrates an exemplary monitoring method according toembodiments of the present disclosure.

FIG. 5 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the disclosure. Rather, the scope ofthe disclosure is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact result from computing devices,processors, controllers, or other devices executing the firmware,software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the disclosure that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or customize for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such modifications are intended tobe within the meaning and plurality of equivalents of the exemplaryembodiments based upon the teaching and guidance presented herein. It isto be understood that the phraseology or terminology herein is for thepurpose of description and not of limitation, such that the terminologyor phraseology of the present specification is to be interpreted bythose skilled in relevant art(s) in light of the teachings herein.

This disclosure pertains to a system for preventing those who have beenconvicted of select intoxication-related offenses from operating a motorvehicle when they are prohibited from doing so. Typically, when anindividual has been convicted of violating certain intoxication laws,such as driving under the influence of alcohol, etc., that person may berestricted from driving for public safety purposes. Unfortunately,barring some extreme exceptions, there are not readily available methodsto ensure that that individual does not ignore that prohibition againstdriving.

For example, there currently exists a system in which an electricalbreathalyzer device is wired to a starting apparatus of the individual'svehicle. The automobile will only start after the individual blows intothe breathalyzer, and the individuals breath has been analyzed and fallsbelow the predetermined blood-alcohol content (BAC) threshold. However,there are significant problems associated with this system. First, thisonly prevents the individual from operating his/her own vehicle, anddoes nothing to prevent the individual from operating a rented orfriend's vehicle. Additionally, since there is currently no means forextracting biometric information from a person's breath, any individualcould blow into the breathalyzer in place of the restricted individual,thereby subverting the system.

In light of the above, a more effective system for preventing restrictedoperation of a motor vehicle is described herein. The system activatesupon detection that the user is traveling faster than a predeterminedrate of speed. Once activated, the system uses either RFID or biometricsto verify the identity of the individual. Then, the system acquiresinformation from an application on the individual's phone to verify thatthe individual is taking transportation from a third-party.Alternatively, the system can analyze photo or other evidence to verifythat the individual is not driving. When the system is unable to gainthese assurances, authorities can be notified. These, and other aspects,are described in detail below.

Exemplary Environment

FIG. 1 illustrates a diagram of an exemplary environment 100 in whichthe monitoring system operates. In an embodiment, the restrictedindividual 102 is in possession of a smartphone or similar device 110.Additionally, the individual 102 is fitted with an ankle bracelet 180 orother monitoring device. Ankle bracelets are commonly affixed to certainoffenders for a variety of reasons, such as to monitor the individual'slocation to being within a restricted area. However, the ankle braceletin this embodiment serves a different purpose. The ankle bracelet storesa unique identifier associated specifically with the individual. Thispositively identifies the individual to the monitoring system running onthe smartphone device 110. In another embodiment, as will be discussedin further detail below, the individual can be identified to themonitoring system without the use of an ankle bracelet, such as throughbiometric verification, etc.

The system does not activate solely because the individual 102 hasentered a motor vehicle 105, but activates when the individual 102 hasexceeded a predetermined speed. Once activated, the smartphoneinterfaces with the ankle bracelet to authenticate the individual, andthen carries out a number of subsequent operations to determine whetherthe restricted individual 102 is driving the vehicle 105. Systemoperation will be described in further detail with respect to FIGS. 2and 3.

Exemplary Monitoring System

FIG. 2 illustrates a block diagram of an exemplary monitoring system 200according to embodiments of the present disclosure. The system includesa smart device 210 and an RF transmitter 280. In an embodiment, the RFtransmitter 280 functions using RFID communications, such as near-fieldload modulation. The smart device 210 operates the substantialfunctionality of the monitoring system, whereas the RF transmitter 280stores identification information of the individual 202, and is used topositively verify the presence and usage of the individual.

The smart device includes monitor processing 230 in the form of one ormore hardware processors and/or circuits that performs the processingfrom the various additional device elements for determining whether theindividual is in violation of the driving restrictions. Those additionaldevice elements are connected to the monitor processing 230, and carryout several additional functions for supporting the monitor processing230. For example, location 215 provides location information to themonitor processing 230. In an embodiment, the location 215 is a GNSSreceiver that receives GNSS signals from a network of GNSS satellites,such as GPS. In other embodiments, the location 215 determines locationwithout the use of GNSS satellite signals, such as by triangulation fromsignal received from nearby base stations and/or access points.

The speed 220 determines a speed with which the smart device 210 ismoving. In an embodiment, speed 220 makes the speed determination basedon information received from location 215, such as based on a change ofGNSS position. However, in other embodiments, speed 220 determines thespeed of the smart device 210 without the use of location information,such as by detecting accelerations of the smart device 210 via anaccelerometer.

Operating alongside the monitor processing 230, application processing255 operates other applications running on the smart device 210.Although any number of applications may be running on the smart device210 at any given time, there are certain applications that areparticularly pertinent to the present disclosure. For example,ride-sharing and ride-hailing apps, such as Uber™ or Lyft™, operate torequest rides or taxi-like services. An application monitor 250 providesan interface between the monitor processing 230 and the applicationprocessing in order to provide information to the monitor processing 230from one or more relevant applications operating in the applicationprocessing 255.

The smart device 210 also includes an input 235, by which the individualcan directly provide certain information to the smart device, such asbiometric information. Additionally, a transceiver 240 is connected withan antenna 245 that is used to communicate with outside devices, such asRF transmitter 280.

The RF transmitter 280 includes a transceiver 290 connected to anantenna for sending and receiving information from an outside device,such as smart device 210. The RF transmitter 280 also includes anIdentification 295. The Identification 295 stores the unique identifierassociated with the individual. In an embodiment, the unique identifieris globally unique.

In operation, the speed 220, alone or together with the location 215,determines a rate of speed of the smart device 210, and forwards theresult to the monitor processing 230. As discussed above, the speed ofthe smart device 210 may be determined in a variety of different ways,including determining rate of change of GNSS position based oninformation received from location 215, as well as force measurementsfrom one or more force detection sensors (e.g., accelerometer).

The monitor processing 230 determines, based on the received speedinformation, whether the smart device 210 is exceeding a predeterminedthreshold speed. If the monitor processing 230 determines that thethreshold speed has been exceeded, the monitor processing carries outfurther steps to attempt to determine whether the individual associatedwith the smart device 210 is currently driving a motor vehicle, inviolation of the prohibition from doing so.

To that end, the monitor processing 230 first verifies an identity ofthe individual. This ensures that the restricted individual is presentwith the device so as to prevent false positives, among other uses. Inorder to verify the identity of the individual, the monitor processingcauses the transceiver 240 to transmit a signal to the RF transmitter280. The transmitted signal is received by the RF transmitter 280, whichcauses the RF transmitter 280 to retrieve the unique identifier from theIdentification 295. The RF transmitter then replies to the signal bysending the unique identifier back to the smart device 210. In anembodiment, the unique identifier is encoded prior to transmission.

In another embodiment, rather than being configured for RFIDcommunication, the RF transmitter 280 is instead configured tocommunicate using another wireless communication protocol. An example ofsuch a protocol is Bluetooth®, such as Bluetooth Low Energy (BLE).Bluetooth Low Energy is a wireless personal area network technologydesigned for low power consumption. Many mobile operating systemsnatively support BLE. When the transmitter 280 and the transceiver 240are configured in this manner, the transmitter 280 periodically pulses anotification to the smart device 210. In order to conserve batter, thispulse is preferably sent relatively infrequently, but often enough tosatisfactorily ensure that the user is present when the driving motionis detected. In an embodiment, the pulse is transmitted to the smartdevice every 4-6 minutes. As is understood from this example, the RFtransmitter 280 can operate in a passive mode or an active mode. In thepassive mode, the RF transmitter does not require a power source, and isinstead activated passively by an outside device. In the active mode,the RF transmitter requires a power source in order to generate thesignals transmitted, such as the pulse notifications described above.

Once received by the smart device 210, the monitor processing 230 makesa determination as to whether the received unique identifier matchesthat associated with the restricted individual. If there is no match,then the monitoring goes dormant until after the speed of the smartdevice has been below the predetermined speed threshold for longer thana predetermined duration, or until after a predetermined amount of timehas passed since the monitoring went dormant. On the other hand, ifthere is a match, then the monitor processing 130 seeks out informationto verify whether the restricted individual is operating a motorvehicle.

In the embodiment illustrated in FIG. 2, the monitor processing 230causes the application monitor 250 to attempt to retrieve informationfrom one or more ride-sharing and/or ride-hailing applications runningin the application processing 255. As discussed above, severalapplications exist that are available on smart devices for acquiringrides from third parties. Many of those applications, such as Uber andLyft transmit a request along with a location of the individual. Manynotifications are then exchanged between the smart device 210 and aserver of the ride provider. Such notifications indicate that a ride hasbeen scheduled, has picked up, has delivered, or informs as to aprojected or final cost of the ride.

Upon receiving the instruction from the monitor processing 230, theapplication monitor 250 begins accessing memory registers and cachememory associated with the ride-sharing and/or ride-hailing applicationson the phone in order to seek out any such notifications. In otherembodiments, the application monitor may seek out the requestedinformation in other manners, such as by monitoring device instructions,monitoring datastreams traversing a data bus or transmitted from theantenna 245, monitoring screen states, etc.

When relevant data is found, the application monitor 250 forwards theinformation to the monitor processing 230, which analyzes the receivedinformation. As part of this analysis, the monitor processing 230attempts to determine whether the individual is using any of thoseapplications to travel. The monitor processing 230 will examine numerousdata points as part of this determination, and will preferably make afinal determination based on an algorithm that takes into accountnumerous of the data points found. Ultimately, based on that algorithm,the monitor processing 230 will determine whether the individual islikely to be driving, or rather is likely to be riding as a passenger ina motor vehicle. Preferably, the monitor processing examines the datafor the presence of a ride request, as well as a date/time stamp and/oridentification information. Together, this information evidences thatthe request was made within a predetermined time of the drive detection,and is associated with the restricted individual.

In an embodiment, the algorithm may consist of calculating a weightedsum of different data points. For example, data points that evidencethat the individual is using one of the riding applications beingprocessed in application processing 255 will be assigned certain weightsthat differ from those data points that evidence against thatdetermination. After averaging the weighted data points, the resultingweighted average is compared against a threshold value. If the weightedaverage exceeds the threshold, then the monitor processing 230determines that the individual is utilizing one of the ridingapplications, and is not driving. As a result, no further action istaken until after a predetermined amount of time as elapsed, or untilafter the smart device is below the predetermined speed threshold forgreater than a predetermined period of time.

On the other hand, if the monitor processing 230 determines based on thealgorithm that the individual is unlikely to be utilizing a riding app,then the monitor processing 230 determines that the individual is likelydriving. As a result of this determination, the monitor processing 230generates an alert signal that includes a preset message and a locationreceived from location 215, and causes the transceiver 240 to transmitthe alert signal to appropriate authorities, notifying them of thelikely violation and providing them with the location of the individual.

In embodiments, if the monitor processing 230 determines that theindividual is not using one of the riding applications to travel, thenthe monitor processing can first seek out additional information fromthe individual before determining that the individual is violating hisprohibition against driving. For example, after making the negativedetermination, the monitor processing 230 issues a notification to theindividual that authorities will be alerted to a violation of theindividual's prohibition against driving unless additional evidence isreceived to establish the contrary.

In response, the monitor processing 230 may be capable of, andconfigured to, analyze a wide variety of additional information receivedfrom the user. For example, the user may access the riding applicationand capture a screenshot showing relevant information relating to acurrent ride, such as date/time, destination, etc. The monitorprocessing 230 employs image processing, such as optical characterrecognition, to extract the relevant information from the image andupdate its determination regarding whether the individual is driving.

The monitor processing 230 may be configured to process a wide varietyof additional information. For example, in some cases, the monitorprocessing 230 may allow for the individual to activate a camera of thesmart device in order to take a picture of the individual's environment.Such a picture may show a bicycle or other non-motorized vehicle beingused by the individual, or may show another individual driving anautomobile in which the individual is a passenger. In order to decipherthose images, the monitor processing 230 may be configured to employpattern matching and image recognition in order to identify bicyclehandle-bars and/or tire widths, a steering wheel and/or seat locationswithin an automobile, as well as to detect and identify faces. Throughthese capabilities, the monitor processing 230 is able to analyze a widevariety of information provided to it by the user in order to ensureaccurate detection of a violation.

FIG. 3 illustrates a block diagram of an exemplary monitoring system300, according to embodiments of the present disclosure. The monitoringsystem 300 does not require any communication with an outside device forverifying the identity of the individual, but rather is insteadself-encapsulating. In the embodiment of FIG. 3, the smart device 210also includes an input sensor 365 and an authentication module 360.

Because the RF transmitter 180 is not available in this embodiment, thesmart device 210 must verify the presence of the individual in analternative manner. Thus, the smart device 210 prompts the user of thedevice to provide certain personal information using the input sensor365. In various embodiments, the input sensor is any biometric sensor ormanual input device. A manual input device allows the individual toenter personal verification data, such as name and unique identifier.However, a biometric sensor is more secure and less prone to faking,hacking, etc. After the input sensor 365 receives the input from theindividual, the authentication module 360 compares the receivedinformation to previously-stored information. When the receivedinformation is biometric information, the authentication module 360performs an analysis of the information in order to carry out aprobabilistic comparison between the received biometric information andthe previously-stored biometric information of the same type. Suchcomparison may include comparing voice prints, face prints, facialarchitectures, iris scans, etc. The result of the comparison is thenacted upon in the manner already described with respect to theembodiment of FIG. 2.

FIG. 4 illustrates a flowchart diagram of an exemplary monitoring method400 according to embodiments of the present disclosure. In the method400, the monitoring system monitors a speed of a device on which themonitoring system operates 410. While monitoring the speed, the systemdetermines whether the speed of the device exceeds a predeterminedthreshold th 415. If the speed does not exceed the predeterminedthreshold (415-N), then functionality returns to speed monitoring 410.

If, on the other hand, the speed of the device exceeds the predeterminedthreshold (415-Y), the system identifies the individual 420. Asdiscussed above, this is performed in one of several different ways,including requesting a unique identifier from an RFID transmitter, or byacquiring identification information from the user. Based on thereceived information, the system verifies whether the user is therestricted individual 425. If the user is not the restricted individual,then operation returns to speed detection 410. In an embodiment, theremay be some predetermined time elapse or other trigger required beforere-initiating the monitoring method.

If the user is the restricted individual, then the system attempts toacquire information from one or more relevant applications running onthe device 430. During this step, the system will access various datasources associated with different applications on the device in order togather relevant information that may evidence use or non-use of aride-sharing or ride-hailing application. After gathering the relevantdata, the monitoring system operates an algorithm 440 in order todetermine whether the restricted user is driving 445. If it isdetermined that the restricted user is not driving (445-N), thenfunctionality returns to speed detection 410. If, on the other hand, thealgorithm determines that there is insufficient information to make adefinitive determination with high certainty, then the individual isprompted for more information 460. After the restricted individualprovides more information, such as in the manner described above, thenthe system makes an updated determination as to whether the individualis driving 445.

If the system determines that the restricted individual is driving(445-Y), then the system generates an alert containing theidentification of the restricted individual and a location of thedevice, and transmits the alert to relevant authorities.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the method of FIG. 4 can be implementedin the environment of one or more computer systems or other processingsystems. An example of such a computer system 500 is shown in FIG. 5.One or more of the modules depicted in the previous figures can be atleast partially implemented on one or more distinct computer systems500.

Computer system 500 includes one or more processors, such as processor504. Processor 504 can be a special purpose or a general purpose digitalsignal processor. Processor 504 is connected to a communicationinfrastructure 502 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 500 also includes a main memory 506, preferably randomaccess memory (RAM), and may also include a secondary memory 508.Secondary memory 508 may include, for example, a hard disk drive 510and/or a removable storage drive 512, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 512 reads from and/or writes to a removable storage unit516 in a well-known manner. Removable storage unit 516 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 512. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 516includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 508 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 500. Such means may include, for example, aremovable storage unit 518 and an interface 514. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 518 and interfaces 514 which allow software anddata to be transferred from removable storage unit 518 to computersystem 500.

Computer system 500 may also include a communications interface 520.Communications interface 520 allows software and data to be transferredbetween computer system 500 and external devices. Examples ofcommunications interface 520 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface520 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 520. These signals are provided to communications interface520 via a communications path 522. Communications path 522 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 516 and 518 or a hard disk installed inhard disk drive 510. These computer program products are means forproviding software to computer system 500.

Computer programs (also called computer control logic) are stored inmain memory 506 and/or secondary memory 508. Computer programs may alsobe received via communications interface 520. Such computer programs,when executed, enable the computer system 500 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 504 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 500. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 500 using removable storage drive 512, interface 514, orcommunications interface 520.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

Conclusion

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A device comprising: at least one radio transceiver; a speed sensor configured to detect a current speed of the device; and one or more processors and/or circuits configured to: receive a current speed of the device from the speed sensor; compare the current speed to a stored speed threshold; determine that the current speed exceeds the stored speed threshold; authenticate a user in response to the determining; and cause the at least one radio transceiver to transmit an alert signal in response to successfully authenticating the user.
 2. The device of claim 1, wherein to authenticate the user, the one or more processors and/or circuits are configured to: cause the at least one radio transceiver to transmit a request message to a nearby device; and receive identification information in response to the request message.
 3. The device of claim 2, wherein the identification information includes a unique identifier associated with a monitored individual, and wherein to authenticate the user, the one or more processors and/or circuits are further configured to compare the received unique identifier to a stored identifier.
 4. The device of claim 2, wherein the alert signal includes location information of the device and an identifier of the authenticated user associated with the device.
 5. The device of claim 2, wherein the nearby device is a fixed device affixed to the user, and wherein the request message is transmitted via a short-range communication protocol.
 6. The device of claim 1, wherein the at least one radio transceiver is configured to periodically transmit a location of the device.
 7. The device of claim 5, wherein the short-range communication protocol is one of Bluetooth™ or Bluetooth ™ Low Energy.
 8. A method for monitoring an individual, comprising: detecting a current speed of a device associated with the individual; comparing the current speed to a stored speed threshold; determining that the current speed exceeds the stored speed threshold; authenticating the individual in response to the determining; and transmitting an alert signal in response to successfully authenticating the individual.
 9. The method of claim 8, wherein the authenticating of the individual includes: transmitting a request message to a nearby device; and receiving identification information in response to the request message.
 10. The method of claim 9, wherein the identification information includes a unique identifier associated with the individual, and wherein the authenticating of the individual further includes comparing the received unique identifier to a stored identifier.
 11. The method of claim 9, wherein the alert signal includes location information of the device and the identifier of the authenticated individual associated with the device.
 12. The method of claim 9, wherein the nearby device is a fixed device affixed to the individual, and wherein the request message is transmitted via a short-range communication protocol.
 13. The method of claim 8, further comprising periodically transmitting a location of the device.
 14. The device of claim 12, wherein the short-range communication protocol is one of Bluetooth™ or Bluetooth™ Low Energy.
 15. A system for monitoring an individual, comprising: a wireless communication device associated with the individual, the wireless communication device including: a transceiver; a speed sensor configured to detect a current speed of the device; and one or more processors configured to: receive the current speed from the speed sensor; compare the current speed to a stored speed threshold; determine that the current speed exceeds the stored speed threshold; authenticate the individual in response to the determining: and transmit an alert in response to successfully authenticating the individual; and a fixed device affixed to the individual, the fixed device including: a memory that stores a unique identifier of the individual; and a transceiver configured to transmit the identifier to the transceiver of the wireless communication device.
 16. The system of claim 15, wherein the wireless communication device is configured to transmit a request to the fixed device in response to the determining.
 17. The system of claim 16, wherein the transceiver of the fixed device is configured to receive the request and to transmit the identifier in response to the receiving of the request.
 18. The system of claim 17, wherein the transceiver of the fixed device is configured to encrypt the identifier before transmitting the identifier to the wireless communication device.
 19. The system of claim 15, wherein the one or more processors are configured to periodically transmit a ping signal to the fixed device, and wherein the transceiver of the fixed device is configured to receive the ping signal and to transmit a response ping signal to the wireless communication device in response to the receiving of the ping signal.
 20. The system of claim 17, wherein the fixed device further comprises a location sensor configured to detect a current location of the fixed device, wherein the transceiver of the fixed device is configured to transmit the current location in response to the receiving of the request. 