Virtual badge, device and method

ABSTRACT

A system, method, and device comprising a virtual badge are disclosed. A virtual badge can be displayed on a cell phone or in another linked portable device, and for security purposes, has images which can be scanned, and the capability to alternate colors and/or self-destruct on a pre-set schedule. Whether for after a disaster or for daily use, the system uses cell phones or mobile devices loaded with specialized software. Using plugin technologies, the system optionally can enable field collected photos and notes on customizable forms to be mapped, tracked, and time/date stamped—including in a 100% disconnected environment. A modifiable virtual badge can aid in inventory, accountability, organization, and efficiency. The system can be employed by the “Whole Community”—citizens, businesses, not-for-profits, and government agencies—for social media, business, cleanup, insurance adjusters, or personnel focused on day to day operations or on mitigation, preparedness, response, and recovery.

REFERENCE TO RELATED APPLICATIONS

In accordance with 37 C.F.R 1.76, a claim of priority is included in anApplication Data Sheet filed concurrently herewith. Accordingly, under35 U.S.C. §119(e), 120, 121, and/or 365(c) the present invention claimspriority as a continuation-in-part to U.S. patent application Ser. No.13/661,555, filed on Oct. 26, 2012, entitled, “VIRTUAL BADGE, DEVICE ANDMETHOD”, which claims priority to U.S. Provisional Patent ApplicationNo. 61/709,844, filed on Oct. 4, 2012; entitled, “VIRTUAL BADGE, DEVICEAND METHOD”, and is a continuation-in-part of U.S. patent applicationSer. No. 13/536,618, filed Jun. 28, 2012, entitled, “GPS PATHFINDER CELLPHONE AND METHOD”, which is a continuation-in-part of U.S. patentapplication Ser. No. 13/524,724, filed Jun. 15, 2012, entitled, “GPSPATHFINDER CELL PHONE AND METHOD”, which is a continuation-in-part ofapplication U.S. patent application Ser. No. 13/296,874, filed Nov. 15,2011, entitled, “GPS PATHFINDER CELL PHONE AND METHOD”, which is acontinuation-in-part of application U.S. patent application Ser. No.12/410,003, filed Mar. 24, 2009, entitled “GPS PATHFINDER CELL PHONE ANDMETHOD”, now U.S. Pat. No. 8,154,440, which is a continuation-in-part ofapplication U.S. patent application Ser. No. 11/696,532, filed Apr. 4,2007, entitled “GPS PATHFINDER METHOD AND DEVICE” and now abandoned. Thecontents of each of the above referenced applications or patents areherein incorporated by reference in its entirety.

FIELD OF THE INVENTION

The present invention relates to electronic identification for daily useas well as for disaster response and recovery systems which incorporatesa variety of approaches to daily and pre and post disaster operations;and more particularly to a system, method and device which provide for avirtual badge on an electronic device, such as a mobile device as wellas a separate, synched, cost effective, electronic display device.

BACKGROUND OF THE INVENTION

The present invention is a continuation in part of U.S. Pat. No.8,154,440 and related applications as described above, the contents ofeach are incorporated by reference in its entirety. The '440 patentdescribes a mobile software system for a variety of operations before,during, and after a disaster. The '440 patent further disclosed systemsthat provided a mechanism which can be used in a variety of emergencymanagement operations. One area not addressed was the need for rapid,massive registration and badge identification of large numbers ofpersonnel, especially following a disaster. Responders, residents, andbusiness owners, plus their employees, all need access to restrictedareas. The National Response Framework even mandates such badging, yetno viable, fast, simple, inexpensive, and high capacity system isavailable. Up until now, plastic badges or temporary paper badges havebeen the norm. The cost of badge supplies, printers, labor, on sitepower, and wasted time preparing such items in the chaotic timesfollowing a disaster are replaced and/or augmented by the presentsystems, methods, and device. With this new “virtual” badging systemdescribed herein, having web based registration from areas remote fromthe restricted area, the present invention provides more rapid andefficient, mass implementation of identification mechanisms.

The electronic identification system includes a virtual badge on amobile device as well as an additional method of using a separate,synched, cost effective, electronic display device. The presentinvention is adapted to be used in normal, day-to-day operations. Thesystem therefore, is designed to be easily implemented so that userswill be familiar with the system, thereby eliminating the requirement ofresponders and citizens attempting to learn a new system in the chaosimmediately following a disaster. This guidance of focusing on WholeCommunity response programs to integrate such systems into normal day today use follows protocols of the Department of Homeland Security (DHS).The present invention is further adapted to be usable in a 100%disconnected environment when all interne and cell infrastructure is notfunctioning.

The present invention further describes a system of workflow managementdesigned to be used to badge and then to monitor and track mobileworkers. By providing administrators with the ability to send alerts andtasks to their badge users, as well as allowing users to send notes,forms, and events to each other, the virtual badge system in accordancewith the present invention can be used to efficiently manage personnel.While the present invention finds use in the disaster arena, othernon-emergency applications are contemplated and described herein. Thepresent invention includes a cellular phone or a linked device equippedwith mobile software, a Global Positioning System (GPS) receiver, GPSfunctions, and BLUETOOTH® (or other evolving technologies like NearField Communications, herein referenced as NFC), comprising a systemdesigned to also work when cellular towers are damaged or destroyed.

The '440 patent was first designed for use with feature phones, known bysome now as “dumb phones.” The recent developments in mobile technologyhave resulted in touchpad based and GPS capable cell phone computersknown as “smart phones” and “tablets”, which have advanced computingabilities. These devices allow for much simpler software applicationintegration with the device hardware which constantly is being updatedwith new inventions, such as the Radio Frequency Identification (RFID)chips, the Near Field Communication (NFC) chip, the GPS receiver, or theBLUETOOTH® chip. These upgrades to mobile devices allow for much easiercustomization of software applications to be cross-platform and becompatible with a multitude of devices from a multitude of cellularcarriers. The present invention is adapted to merge the dumb phones withsmart phones into a system designed to not only work on both types ofphones, but also allowing for computers and smart phones to map andtrack mixed teams of dumb and/or smart phone users. Accordingly, thisvirtual badge system is designed to work regardless of the condition ofthe local power, cell, and Internet infrastructure—a needed requirementin the disaster field.

DESCRIPTION OF THE PRIOR ART

U.S. Pat. No. 8,073,461 is described as disclosing a location sharingnetwork manager process. The process is executed on a server computercoupled to a plurality of mobile communication devices over a wirelessnetwork. Each mobile device is a location-aware mobile communicationdevice. The process determines the geographic location of a mobilecommunication device operated by a user within an area, displays a maprepresentation of the area around the mobile communication device on agraphical user interface of the mobile communication device, andsuperimposes on the map the respective locations of one or more othertrusted users of mobile communication devices coupled to the mobilecommunication device over the network. A journal creation and managementcomponent provides tools for users to create and store user-generatedcontent in the form of an online journal. This user-generated contentcan be automatically tagged with location information provided by thelocation-aware mobile communication device. Such geo-tagged journalinformation can be shared with specific users in the network or utilizedby users with specific interest in the location dimension of the journalcontent. The user-generated content can be provided in the form of textor graphic messages, pictures, audio/video clips, and the like.

U.S. Publication No. 2010/0076968 is described as disclosingimplementations that relate to systems and methods for aggregating andpresenting data related to geographic locations. Geotag data related togeographic locations and associated features or attributes can becollected to build a regional profile characterizing a set of locationswithin the region. Geotag data related to the constituent locations,such as user ratings or popularity ranks for restaurants, shops, parks,or other features, sites or attractions can be combined to generate aprofile of characteristics of locations in the region. The platform cangenerate recommendations of locations to transmit to the user of amobile device, based for instance on the location of the device in theregion as reported by GPS or other location service and the regionalprofile. Geotag data can include audio data analyzed usingregion-specific terms, and user recommendations can be presented viadynamic menus based on regional profiles, user preferences or othercriteria.

U.S. Pat. No. 8,174,931 is described as disclosing an apparatus andmethod for providing indoor location, position, or tracking of a mobilecomputer using building information. The mobile computer determines thedimensions of a room in a building using a range finder in the mobilecomputer. The determined dimensions of the room are compared to thebuilding information to locate, position, or track the mobile computerin the building.

U.S. Pat. No. 7,778,802 is described as disclosing a system thatutilizes wireless devices as guard tour checkpoint data collection andcheckpoint data communication devices. The wireless devices have thecapability of reading various types of checkpoints and communicating thecollected checkpoint data with a computer via a cellular telephonecommunication system and either a land-based telephone network, theInternet or a cellular data communication device. Alternatively, a Wi-Finetwork or the Wi-Fi network and the Internet can be used to communicatecollected checkpoint data with the computer. The computer stores andprocesses the data according to guard tour expected performanceparameters, such as rules, schedules, and exceptions, and then generatesthe necessary commands to produce exception notifications and reports atvarious types of peripheral equipment.

U.S. Pat. No. 7,142,900 is described as disclosing a prior art devicewhich combines a handheld GPS receiver and a radio. The unit includes aGPS receiver and a radio transceiver. The GPS receiver operates inconjunction with cartographic data which is downloadable fromcartridges. This enables the user to download a map of the immediatevicinity and determine their current location with respect thereto. Theradio is a two-way radio which operates on the Family Radio Services(FRS) portion of the Citizens Band Radio Services. The broadcast rangeof these radios is generally two miles or less and they are commonlyused by family and friends to keep in touch with each other in areassuch as amusement parks and other recreational areas. The unit also hasGMRS capability. This unit also has a “polling” function. This functionis performed when a pushbutton or other device is activated to transmita radio request to the other GPS/radio units to indicate theirlocations. The other units will automatically transmit their locationsto the unit that had made the request. These locations can then bedisplayed on the requesting unit's display and the user can readilydetermine the locations of the other members of their party. While thisunit can download a given day's track to a base unit, it does not haveBLUETOOTH® technology and therefore must be hard wired to the base unitto store its track. Further, the use of the unit is far too complicatedfor the common user without prior instructions. In addition, the usercannot associate a written description or code with a specific waypointin the unit.

U.S. Pat. No. 6,268,798 is described as disclosing a locator system forfirefighters which incorporates a GPS receiver and a memory. Thefirefighter activates the locator unit as he enters a building and theunit records his path through the building. Should he become disorientedor injured he can activate the memory in the unit and the unit willprovide a reverse indication of the path that was traversed up to thatpoint. By following these reverse directions, the firefighter is able tosafely exit the building. The unit can also communicate with a home baseand transmit the path traversed by the firefighter to the home base soit can be uploaded to another unit. This second unit is employed by arescuer into the building and by retracing the path the lost or injuredfirefighter is located. While these units can download a path traversedby a user, they are not equipped to be uploaded with a path to follow oran area to search. Further, they cannot associate a specific writtencondition or code with a waypoint.

U.S. Pat. No. 5,619,412 is described as disclosing a remotely accessibleengine on a vehicle. Control of the engine can be performed on thevehicle, by the vehicle operator, or from a remote location viasatellite communications.

U.S. Pat. No. 6,292,724 is described as disclosing discloses a systemfor monitoring the location, status, utilization and conditions of awidely geographically dispersed fleet of vehicles utilizing satellitepositioning and communications and the Internet. The data obtained fromthe vehicles can be displayed at numerous locations.

U.S. Published Patent Application No. 2003/0080897 is described asdisclosing a combination GPS receiver and radio. The GPS receiveroperates in conjunction with a memory to enable a user to retrace thepath they had just traversed. This feature enables a user to return totheir starting point without getting lost. The radio operates on theGeneral Mobile Radio Service (GMRS) or Family Radio Service (FRS)portion of the Citizens Band Radio channels. The broadcast range ofthese radios is generally two miles or less. While these units candownload a path traversed by a user, they are not equipped to beuploaded with a specific path to follow or an area to search. Inaddition they cannot associate a written description or code with aspecific way point.

U.S. Pat. No. 6,574,561 is described as disclosing a system forautomating the gathering of field information which describes thecondition of specific locations at specific times utilizing a fieldinformation recording device which has a GPSW receiver for recording andassignment of the space-time coordinates as information is gathered.

U.S. Pat. No. 6,868,340 is described as disclosing also discloses asystem for automating the gathering of field information which describesthe condition of specific locations at specific times utilizing a fieldinformation recording device which has a GPSW receiver for recording andassignment of the space-time coordinates as information is gathered. Theinformation and space-time coordinates are transmitted to a managementcenter for processing.

U.S. Pat. No. 6,999,876 is described as disclosing a system forproviding centralized deployment and coordination of field assessmentactivities. An emergency management data processing system includes afield assessment database for storing and processing layered geospacialvisual portrayal data and field surveillance attribute data.

U.S. Pat. No. 7,822,816 is described as disclosing a method and systemfor the management of data collected from a remote computer. The methodincludes creating a questionnaire, transmitting the questionnaire to aremote computer, executing the questionnaire in the remote computer toprompt a user for responses to questions of the questionnaire,transmitting the responses to a server via a network, and making theresponses available on the Web. The computers utilized in this systemare loosely networked, in that the network connections between thecomputers are not always available and when a connection is notavailable, data is stored at a node of the network and transmitted atthe earliest time when a connection is available.

U.S. Pat. No. 5,592,408 is described as disclosing discloses anelectronic identification device and includes a header piece with storedmemory and terminals for interfacing with an electronic port of a readerdevice, with encoded data programmed into the memory. An identificationcard, identifying the holder, is attached to the electronic header pieceand bears printed information relating to and identifying the intendedholder.

U.S. Pat. No. 6,315,198 is described as disclosing discloses a keycabinet (AC1) for equipping an access control system (1) comprising aplurality of devices for reading data associated with personalidentification means (EI), access control management means in particularcomprising decision making means for controlling accesses and means forretaining a trace of the events occurring in this system, this cabinet(AC1) comprising means (Ci,j) adapted to receive a set of keys (CL) andmeans (TL) for controlling access to these receiving means. Itfurthermore comprises means (SC, CE1) for generating a virtual badgecorresponding to any change of state, this virtual badge then beingtransferred to decision making means. Application in particular forequipping existing access control systems with key cabinets.

U.S. Pat. No. 7,760,905 is described as disclosing a portable wirelessphone device includes a module configured to derive identification datafrom audio or visual content. The phone device transmits a packet ofdata to a remote system that includes both context or environment data,and also at least part of this derived identification data. The wirelessphone device has modules configured to derive the identification datafrom content, by the application of watermark decoding, or identifierdata stored in packets for various purposes.

U.S. Pat. No. 7,631,805 is described as disclosing discloses methods andsystems for managing personnel security at physical locations. Themethod includes obtaining screening data from a plurality of differentvendor entities and individuals associated with those vendor entities,where the screening data is obtained to screen the vendor entities andindividuals to determine whether physical access to facilities of thesponsor entities should be granted. The method further includesperforming background checks on the outside companies and theiremployees based on the screening data, where the background checks areinitiated by the administrator entity using a computer-based systemoperated by the administrator entity.

U.S. Pat. No. 6,058,304 is described as disclosing discloses a dataentry system includes a hand held data entry unit having a readingsensor for sensing commands and/or data, rewritable storage for storinginformation relating to selectable items, a controller (a microprocessoror other processing circuitry) and a display screen for displaying auser readable representation of the commands and/or stored informationfor a selected item, and a telecommunication interface for thetelephonic transmission of information relating to items from thestorage to a remote processing center and for the information relatingto selectable items from the remote processing center to the storage.Preferably a telecommunications interface is provided in the hand heldunit for cellular or other wireless telephony systems.

U.S. Pat. No. 6,394,356 is described as disclosing an access controlsystem for monitoring human ingress and egress comprises an input meansfor creating a unique identifier for to be stored in a database. Theunique identifier includes a digital image of the person, a digitalimage of the unique identifier, and alphanumeric identification data. Aprocessing means coupled to said input means is operable to perform thesteps of storing the unique identifier as a computer-readable file inthe database, recording the arrival date and time of a person; creatinga tracking record associated with the unique identifier. The uniqueidentifier can be displayed on a monitor coupled to the processingmeans. A printer coupled to the processing means generates an accesspass on portable media which includes a viewable image of the person andthe identification document, and alphanumeric identification data forthe person. The access pass can also include machine readable mediawhich comprises a coded representation of the unique identifier.

U.S. Pat. No. 8,145,183 is described as disclosing an emergency locatorsystem adapted for GPS-enabled wireless devices. Global PositioningSystem (GPS) technology is and Location Based Services (LBS) are used todetermine the exact location of a user and communicate informationrelating to the emergency status of that location. The user initiatesthe locator application via a wireless device and their physicallocation information is automatically transferred to a server. Theserver then compares the user's location with Geographic InformationSystem (GIS) maps to identify the emergency status associated with theirlocation. Once the server has calculated the current emergency status,the information is automatically returned to the user, along withemergency instructions.

U.S. Pat. No. 8,045,954, is described as disclosing a method ofproviding emergency related information to and from a centralizedlocation over a wireless network. The method utilizes cellular phones inemergency communications and entails two embodiments that employlocation-aware technologies, in portable form, in security applications.One embodiment serves as a modern high-tech “neighborhood watch,”enabling law enforcement access to the many “eyes and ears” of thepublic simultaneously via available cell phones. Cell phones withembedded digital cameras allow the instant capture and remote submissionof suspicious circumstances to law enforcement through pictures orvideo.

U.S. Patent Publication No. 2006/0168185 is described as disclosingarrangements for collecting, analyzing, consolidating and deliveringconsolidated and enhanced data from a plurality of sources relating to acurrent event, to a third party, and reserving the consolidated andenhanced data for internal use so as to create a commercial proactiveemergency management and disaster response information system that canalso be used for emergent commercial purposes. A data capture deviceassociated with an individual or a location captures data related to acurrent event or affected site. Incoming data may include raw data,repackaged data, or value-added data from source inputs. Captured datais sent to a centralized command center or distributed command centerswhere it is analyzed, resolved, correlated and repackaged for use byother parties.

U.S. Pat. No. 7,808,378 is described as disclosing an alert notificationsystem and method for neighborhood, business, work location, communityand other groups for broadcasting an alert message from one member ofthe group to the other members of the group. A member of the group whosees or hears of an alert condition, which may be criminal activity,suspicious character(s), animal running loose, natural or man-madedisaster or the like, becomes an alert initiator by calling a centrallybased alert processing device that, after verifying the caller is amember of a group, allows the caller to record an audible alert messagedescribing the alert situation. The processing device then broadcaststhe alert message to each member of the alert initiator's group orgroups so the alert recipients may take appropriate action to protectlives and/or property. The alert processing device stores infatuationregarding the caller and the message for later auditing and retrievalpurposes.

U.S. Pat. No. 6,842,774, is described as disclosing alerts are generatedat mobile entity devices and servers. The alerts are examined at theservers and handled by the server and/or forwarded to a clearing house.At the clearing house, emergency events are created in response to thealerts by an event module. A notify module compares events to aninformation need associated with a subscriber profile to determinewhether a subscriber associated with the subscriber profile should benotified about events. The notify module also handles interactive searchrequests from a client for the events.

What is needed in the art is a virtual badging system. Such system mustbe able to function in a 100% disconnected environment and include acell phone and/or a simple, inexpensive, lightweight, reusable,electronic device capable of either scanning and/or storing data,images, and/or photos, and being linked to a smart phone or dumb phoneto assist in entry or re-entry into restricted areas, while providingunique field monitoring solutions to managers in any type of technologyconnected or disconnected environments.

SUMMARY OF THE INVENTION

The present invention is a method, system, and device for use in variousstages of operations before and after a disaster. Due to thecustomizable nature of the software described herein, coupled withever-changing DHS directives, the present invention is designed for usein non-disaster purposes as well, including but not limited to: gatedcommunity access, restricted access areas, business managementapplications, user-to-user and user-to-business social networking, andplanned or spontaneous volunteer management.

The virtual badge system, method, and device evolve into another levelto enhance the subject matter of the '440 patent and relatedapplications by using advanced mobile art described herein. A virtualbadge, which can be tracked if desired, can contain customizable data,photos, and/or images, which are scanable for various applications. Thevirtual badge is displayed on a cell phone and/or other electronicdevice and replicates what a typical plastic badge can display. Thissystem also can incorporate the Internet and a cell system, oralternatively can be used by linking to a local Wi-Fi or other wirelessnetwork area, if so programmed. A separate device is presented, eithersynched with a cell phone or standing alone, as a cost-effectivealternative to using expensive smart phone devices, so that a user mayhang it around his/her neck with a lanyard. It is designed so anypasserby can readily identify the user and/or a check point guard canreadily observe and/or scan the device to verify the user's identity.The virtual badge, displayed on a cell phone and/or the device, can bepre-programmed to change colors or designs as well as automatically bepre-programmed to “self-destruct” the images, photos, and/or data forsecurity reasons, pursuant to an administrator's specifications. Foradditional security and by using GPS, the virtual badge can be displayedon a map of the user's cell phone, a group leader's cell phone, a webbased administrator's computer or a base server. Further, for moreefficient management purposes, a group leader's cell phone can beauthorized to display a map, which map reveals the locations of adesignated group of virtual badge users. The entire new system can belinked into existing software systems using traditional hard and paperbadging systems to augment them.

The virtual badge system is unique in that it can allow a badgeapplicant to submit a request through a web based portal, where anagency (or a business entity) like a Fusion Center or local Sheriffsoffice, can review and approve the request. After authenticating arequest, soliciting a payment if desired, creating a unique numberidentifier, and performing a background check, if desired, the agencythen could send out a virtual badge via an email or text SMS, or someother electronic means, to a cell phone number, where the virtual badgethen could be displayed either on the phone screen and/or on to aseparate device. Using this method, the applicant is not required to bein the physical presence of the reviewing agency's personnel, whonormally then would have to print out a plastic or paper badge. Thisbadge is created in a virtual world, allowing for approving and sendingout virtual badges across the country or the world, immediately, andthen allowing for tracking those virtual badges using still active cellservice, if desired, as they are inbound to a location.

Upon arrival, if still linked via cell towers to a cell phone with GPS,the virtual badge can be mapped and tracked live. The virtual badge alsocould be designed to be tracked in a local area using wireless systems,such as but not limited to a radio frequency identification system(RFID), near field communication system (NFC), or other chip, with anadded linked device on a user's lanyard, if desired. Combining methodsdescribed in previous applications, the virtual badge could be createdwith a laptop computer linked to an electronic display device, such ascell phones in an area with no cell service at all. In the 100%disconnected environment (such as a system not having any cell towerfunctioning), the virtual badge could be sent from a laptop or a serverto cell phones and/or the devices, using wireless or hard wiredtechnologies, as best fits the situation. Finally, and most importantly,this virtual badge can be mapped and tracked in a 100% disconnectedenvironment following a disaster (or in any remote area where cellservice does not exist).

The separate, electronic device described above could display a seriesof customizable data, photos, and/or images, which originate from theuser's own synced or linked cell phone or alternatively from a centralnetwork administrator. These data, photos, and/or images also aredesigned to be viewed or scanned, and various settings on the deviceallow for flexibility for settings to both accommodate battery life aswell as changes in views for the user. The device also can be used totrack the device holder via technology described herein or additionallyby making use of RFID or NFC technology. The device expands thecapability of the system, while widening the scope of the invention toinclude mapping, tracking, and/or historical uses of the device and itsholder, if desired. Because of its design and ability to erase itsmemory, the device can be re-used multiple times for many differentusers, unlike present plastic badges.

The present invention can further allow for tracking and monitoring theuse of the virtual badge via other means. Through a scanning device,which could include a check point's use of a Smart Phone with thissystem which includes its own scanning software, or through simplypassing by an RFID or NFC reader, the system can log the time and dateof that virtual badge user passing that check point. As an example, in a100% disconnected environment, with a cached memory of approved virtualbadge data stored within the Smart phone of a guard at a check point,the guard could verify the virtual badge holder by scanning the guard'sphone's camera over the virtual badge holder's optical machine readablerepresentations of data as part of the displayed image of the badge,such as linear QR or bar code images, thus retrieving from his/her Smartphone's memory a photo of the virtual badge user to compare with theperson in front of the check point's guard, as an example (NFC offersanother variation). The new system further can allow a supervisor tovisualize on a displayed map on his/her mobile device where all thevirtual badges in a designated group currently are located.

The administrator or designee likewise could use the virtual badge datato facilitate seamlessly organizing crews according to the IncidentCommand System (ICS). The system also can add or change the data storedin the virtual badge at any time through administrative procedures likescanning a user's driver's license, which may contain additional data tostore in the virtual badge. The system can analyze and monitor the useof the virtual badge given the historical data provided by variousingresses and egresses past check points tied to the system, includingin a 100% disconnected environment. Alternatively, the system can belinked to other systems for further analysis or integration on a morebroad monitoring system via an API link into another system.

The software used in the present system, methods, or devices is designedto permit the cell phone and/or the device to automatically or manuallydownload the information stored as data to a laptop “server” or otherdevice which functions as a “server”, including datacenter based servers(“cloud” servers), when the cell phone and/or device is withinBLUETOOTH®, cellular, or other wireless service range of the server. Inthe situation where there is no cell service, a cell phone and/or devicecan communicate to the laptop server or opther server without the use ofcell towers or the Internet, which in a totally or partiallydisconnected environment, is the setting frequently confronting users.This system relies upon common software designs which can incorporateUnix, Windows, Java, and other common technologies programmed into thisapplication to allow the cell phones and/or devices to optimize theireffectiveness, as well as cell phone operating systems included but notlimited to: Apple's iOS and variants, Google's Android and variants,RIM's BLACKBERRY® OS, and Windows Mobile OS.

As an illustrative example, a method of identifying an individual usingan electronic identification system utilizing a virtual badge maycomprise the steps of establishing a customizable set of data to beincluded in an electronic identification system database for identifyingone or more individuals from a user group using a virtual badge;identifying at least one individual that requires electronicidentification using said virtual badge; providing an electronic profilefor said individual; creating a virtual badge based on said electronicprofile; said virtual badge having information, images, or combinationsthereof which identify said individual; providing each said individualaccess to said virtual badge; and downloading said user's virtual badgeto a first display device, and displaying said virtual badge on a firstdisplay device. The method may further include mapping, tracking, orcombinations thereof, said virtual badge downloaded or displayed on saidfirst display device. The first display device may further be linked toa second display device so that virtual badge image displayed on saidfirst display device will be displayed to a second display device.

In an alternative embodiment, the method of identifying an individualusing an electronic identification system utilizing a virtual badge maycomprise: establishing an administrative entity for administering anelectronic identification system using a virtual badge; identifying atleast one user group to be registered with said administrative agency,said user group having at least one individual member requiring the useof said virtual badge; said administrative entity establishing acustomizable set of data to be included in an electronic identificationsystem database for identifying one or more individuals from a usergroup using a virtual badge; each said individual member registeringwith said administrative entity, said registration including providinginformation which identifies said individual; creating said virtualbadge for each said individual of said user group, said virtual badgehaving one or more identifying indicia unique to each said individual;storing said virtual badge on a server administered by saidadministrative agency providing each said individual of said user groupaccess to said virtual badge; and displaying said virtual badge on afirst electronic display unit. The method may further include mapping,tracking, or combinations thereof, said virtual badge downloaded ordisplayed on said first display device. The first display device mayfurther be linked to a second display device so that virtual badge imagedisplayed on said first display device will be displayed to a seconddisplay device.

In another alternative embodiment, the method of providing a virtualidentification badge to an individual for providing access to apredetermined area may comprise: establishing an administrative entityfor administering an electronic identification system using a virtualbadge for access to a predetermined area, said administrative entityregistering and issuing said virtual badge to an individual authorizedto receive said virtual badge; providing an individual to be registeredwith said administrative agency; establishing a database havingidentifying information related to said individual, said data stored ona remote server controlled by said administrative entity; creating avirtual badge for said individual, said virtual badge having one or moreidentifying indicia unique to each said individual, one or moreinformation identifying said administrative agency, or combinationsthereof; providing said individual with electronic access to saidvirtual badge; displaying said virtual badge on a first display unit,and providing an on-site administrator for verifying the contentsdisplayed on said virtual badge. The method may further include mapping,tracking, or combinations thereof, said virtual badge displayed on saidfirst display device prior to reaching the predetermined are, whilewithin the predetermined area, or after exiting the predetermined area.The first display device may further be linked to a second displaydevice so that virtual badge image displayed on said first displaydevice will be displayed to a second display device.

Accordingly, it is an objective of the present invention to provide asystem, method, and device for electronic identification.

It is a further objective of the present invention to provide a system,method, and device for electronic identification with a virtual badge toprovide a cell phone and/or a device equipped with GPS and having GPSfunctions with BLUETOOTH® or other wireless technology which canindicate the locations of other similar devices without input from theoperators of the other devices. Real time tracking can thus be achievedas well.

It is yet a further objective of the invention to provide a system,method, and device for electronic identification with a virtual badge toprovide a series of various methods to apply for, enroll, create,authorize, manage, monitor, authenticate, and mass distribute virtualbadges to mobile users via methods described herein.

It is yet a further objective of the invention to provide a system,methods, and device for electronic identification with a virtual badgeto provide cell phones equipped with GPS and having GPS functions withBLUETOOTH® or other wireless technology which can communicate with eachother and also with a base station. Data can be transferred between cellphones and also between the cell phones and the base station.

It is yet a further objective of the invention to provide a system,method, and device for electronic identification with a virtual badge toprovide a functional and efficient database to serve as the repositoryfor all information gathered in the field via a cell phone equipped withGPS and having GPS functions with BLUETOOTH® or other wirelesstechnology.

It is yet a further objective of the to provide a system, method, anddevice for electronic identification invention with a virtual badge toprovide the means for an authorized and affiliated Governmental orprivate entity (typically a County or Parish's Emergency ManagementTeam) to control a disaster response operation, using integrated, ICSsystems and forms, via the cell phone equipped with GPS and having GPSfunctions with BLUETOOTH® or other wireless technology, which interfaceswith a web-based or laptop version of the cell phone software to allowfor administrative activities.

It is yet a further objective of the invention to provide a system,method, and device for electronic identification with a virtual badge toallow users to create discrete groups, businesses, organizations, andaffiliations via a cell phone equipped with GPS and having GPS functionswith BLUETOOTH® or other wireless technology for the purpose of businessmanagement and user privacy.

It is yet a further objective of the to provide a system, method, anddevice for electronic identification invention with a virtual badge toprovide organization tools via a cell phone equipped with GPS and havingGPS functions with BLUETOOTH® or other wireless technology, such thatresponders and users in the field can customize the organization oftheir workers and users into groups as desired by an administrator.

It is yet a further objective of the invention to provide a system,methods, and device for electronic identification invention with avirtual badge to provide inventory management related tools via a cellphone equipped with GPS and having GPS functions with BLUETOOTH® orother wireless technology, such that responders and users in the fieldcan easily create and maintain inventory lists for further reference.

It is yet a further objective of the invention to provide a system,method, and device for electronic identification invention to provide amobile credit card payment system and credit card payment gateway formobile users to process payment via a cell phone equipped with GPS andhaving GPS functions with BLUETOOTH® or other wireless technology, forvirtual badge jobs or purchases completed in the field.

It is yet a further objective of the invention to provide a system,methods, and device for electronic identification with a virtual badgeto provide privacy controls via a cell phone equipped with GPS andhaving GPS functions with BLUETOOTH® or other wireless technology forthe purpose of allowing users in non-disaster purposes the ability to“hide” their location (and information submitted) from other discreteusers, groups, businesses, organizations, or affiliations, subject to anadministrator's approval.

It is yet a further objective of the invention to provide a system,methods, and device for electronic identification with a virtual badgeto provide the user with tools for integration with existing software(via software APIs) such that the data collected via a cell phonesoftware system may be exported and integrated for additional disasterresponse uses, reporting, analytical, or business development purposes.

It is yet a further objective of the invention to provide a system and amethod to display a virtual badge on a cell phone equipped with GPS andhaving GPS functions with BLUETOOTH® or other wireless technology, inorder to provide sufficient mass produced and inexpensive identificationto allow monitored access to restricted areas or planned events.

It is yet a further objective of the invention to provide a system and amethod to sync a cell phone equipped with GPS and having GPS functionswith BLUETOOTH® or other wireless technology with a separate device todisplay a virtual badge.

It is yet a further objective of the invention to provide a system and amethod to sync a Wi-Fi network or Mesh Wi-Fi network with BLUETOOTH® orother wireless technology with a separate device to be able to display avirtual badge, without a cell phone.

It is yet a further objective of the invention to provide variousbusiness models for payment to public and private sector entities,including a combination thereof.

It is yet a further objective of the invention to provide a variety ofsecurity features which can be incorporated into a design and may beautomated to change so as to minimize the threat of counterfeitingvirtual badges.

It is a further objective of the invention to provide a system whichallows administrators to make use of new mobile technologies to be ableto more easily allow users with this system to scan virtual badges withtheir own devices rather than having to use current devices built solelyto scan bar codes, badges, or identification cards.

It is yet a further objective of the invention to provide workforce andbusiness management tools via the cell phone equipped with GPS andhaving GPS functions with BLUETOOTH® or other wireless technology whichcan automatically download data stored on the cell phone to aninternet-based server (generally referred to as the “Cloud”) or a laptopserver with the back end software. All authorized data that is submittedin the field may be accessed by authorized virtual badge users as soonas it is available on the server, near-instantaneously when the cellphones and server are connected to a wireless network, or after the datahas been uploaded via BLUETOOTH® or other wireless technology in adisconnected environment. Given the sensitivity of the data, encryptionand security levels can be set by an administrator.

Other objectives and advantages of this invention will become apparentfrom the following description taken in conjunction with anyaccompanying drawings wherein are set forth, by way of illustration andexample, certain embodiments of this invention. Any drawings containedherein constitute a part of this specification and include exemplaryembodiments of the present invention and illustrate various objects andfeatures thereof.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a perspective view of a combined GPS/radio device according toan illustrative embodiment of the present invention;

FIG. 2A is a block diagram of the components of the GPS/radio of FIG. 1;

FIG. 2B is a block diagram of a communications network linking theGPS/radio unit of FIG. 1 with a plurality of other GPS/radio units;

FIG. 3 is a flow diagram of the procedure utilized by the search andresponse teams;

FIG. 4 is a flow diagram of the procedure utilized by a cleanupcontractor;

FIG. 5 is a flow diagram of the procedure utilized by insurance companyadjusters;

FIG. 6 is a perspective view of a cell phone with GPS and GPS functionswith BLUETOOTH® according to an illustrative embodiment of the presentinvention;

FIGS. 7A-C are perspective views of a “Smartphone” and “Tablet” with GPSand GPS function with BLUETOOTH® according to a preferred embodiment ofthe present invention;

FIG. 8A is a block diagram of the components of the cell phone of FIG.6;

FIG. 8B is a block diagram of a communications network linking the cellphone of FIG. 6 with a plurality of other cell phones;

FIG. 9 is a flow diagram of the procedure utilized by the responseteams;

FIG. 10 is a flow diagram of the procedure utilized by a cleanupcontractor;

FIG. 11 is a flow diagram of the procedure utilized by insurancecompany;

FIG. 12 is a flow diagram of the procedure utilized by a business and/oragency for workforce management;

FIG. 13 is a flow diagram of the procedure utilized by aNon-Governmental organization for volunteer management;

FIG. 14 is a flow diagram of the procedure utilized by an End-User forsocial networking and GPS tracking for event creation and management;

FIG. 15 is a flow diagram of the procedure following a disaster utilizedby a contractor and/or potential employer to post jobs, find jobs,complete jobs, and have payment processed for jobs;

FIG. 16 is a flow diagram of the procedure utilized by a regionalcommander to manage resources and assets in the event of an emergency;

FIG. 17 is a flow diagram of the procedure for GPS enabled software tointeract with a software to upload public data;

FIG. 18 is a flow diagram wherein a screen or view of a handset containsa virtual “badge” or identification;

FIG. 19 is a block diagram of the component associated with thefunctions of FIGS. 17 and 18;

FIG. 20 is an illustrative example of a cell phone with the virtualbadge;

FIG. 21 is an illustrative embodiment of the virtual badge in accordancewith the present invention;

FIG. 22 is a perspective view of the virtual badge according to apreferred embodiment of the present invention;

FIG. 23 shows the components of the virtual badge illustrated in FIG. 21or FIG. 22;

FIG. 24 is a perspective view of the virtual badge displaying a sampleof one potential custom view of a sample badge with various logos;

FIG. 25 is a second view of the virtual badge displaying a second sampleof a second potential custom view of a sample badge with illustrativeidentification information;

FIG. 26 is a diagram of two ways of a separate electronic device withthe virtual badge connecting either through a router to a Wi-Fi or MeshWi-Fi Network or to a cell phone;

FIG. 27 is a flow chart displaying an example of the life cycle of auser requesting the virtual badge through to the self-destruction of thevirtual badge.

DETAILED DESCRIPTION OF THE INVENTION

While the present invention is a susceptible embodiment in variousforms, there is shown in the drawings and will hereinafter be describeda presently preferred, albeit not limiting, embodiment with theunderstanding that the present disclosure is to be considered anexemplification of the present invention and is not intended to limitthe invention to the specific embodiments illustrated.

The present invention creates a system comprising of “backend” software(software adapted to provide necessary functionality for server) on aweb based or laptop server synchronized with a “front-end” software,such as software adapted to be used by a display device, including anelectronic display device capable of displaying images or text, such asa cell phone or tablet computer, to make the device functionaccordingly, i.e. properly display the information as a virtual badge,displayed on the electronic display device. The backend software systemis designed for, but is not limited to, mapping, tracking,authenticating, validating, background checking, managing, distributing,and monitoring an individual and/or designated group of virtual badgeusers. The front-end is designed to communicate with the backendsoftware system and interact in such a way to create a workforcesolution. The system allows added plug in features, i.e. softwareprograms that provide additional functionality that can be added to ortaken out of the primary software systems in place and include, forexample, field forms with photos displayed on a map to maximize thecapabilities of the virtual badge system. While various methods ofcommunications and data transfer may be described, such examples are forillustrative purposes only as the use of any land-based communicationsystems or satellite-based communication systems known to one of skillin the art can be utilized within the systems, devices, or methods asdescribed herein.

To utilize their BLUETOOTH®, wireless, and/or GPS functions in adisconnected environment, modifications to the software in theelectronic display device, such as a cell phone, including smart phones,or a computer tablet, such as APPLE's IPAD, are made prior to their usein the operations via the new software. Once these modifications havebeen made they do not need to be changed except as the user goes intoand out of a working cellular network (or the network is re-establishedby repairs). These modifications can be made utilizing BLUETOOTH® orother wireless communications from a base station or on the cell phoneunit itself if the model has such capability. As another example, aGPS/cell phone can be used when modified, and with additionalprogramming and/or modifications as well as newly developed cell phonehardware, a host of other phones can utilize this system. Newer cellphone models may not require as extensive a modification, but to work inthe disconnected environment, changes are still needed. To allow formonitoring of other dumb and smart phone users simultaneously within agroup by a smart phone supervisor, modifications designed within thissystem also are required for the front end user.

In the proposed system, first, an administrator, which could be anagency, a business, a group, and/or simply a resident/citizen(hereinafter collectively referred to as an “administrator”), wouldregister on a web based portal to obtain access to the softwaredescribed herein. In a disconnected environment, alternative meansdescribed herein may be used. Validation like a background check couldoccur at this stage of this entity or person. The administrator can thenselect from a menu of options (or customize further selections, ifdesired), which options create a specified list of registry itemsrequired to secure a virtual badge. These items could include as wide ornarrow a list as desired. Some examples would be an ID photo, homeaddress, business address, unique ID number, driver's license number, ora host of other options to be established by the administrator.Additionally, if desired, the software will allow the administrator tobrand both the front end and back end so that the web or mobile deviceview can easily incorporate a logo or a group of logos. Similarly, thecell phone splash page is easy for an administrator to customize, if sodesired, so that a unique identifier accompanies the softwareapplication distribution.

A payment for this first step also can be included, with various levelsof approvals such as security clearances, or alternatively volume basedpricing, established as further alternatives to the business methodologyproposed. For a further example, if this initial application were to aSheriffs office, such a fee could be split three ways between theSheriff, a local police department, and the administrator. Incentives torecapture costs for maintaining and sustaining the system are thusmodeled in a true public/private partnership.

In a next step, users with cell phones with GPS and BLUETOOTH® and/orother wireless technology can apply to the administrator for a virtualbadge to be part of that grouping. Alternatively, the administratorcould elect to send requests to a designated group of front end users.Either using their phone to apply via a web link or by registering online via the Internet, each user then can supply the personal data aspre-established by the administrator to be approved for a virtual badge.Following the submittal of the personal data, the administrator cananalyze the application, including if desired, outsourcing a backgroundcheck of that user by a third party service. The same administrator maychoose different levels of checks for different users, as well as maychoose different badges for different events. As a further businessmethod step, an additional payment can be made either by theadministrator or by the user prior to the issuance of each virtualbadge. Volume discounts and differing clearance levels can lead tovarious pricing models. All of these processes can be automated in theback end system.

Upon approval by the administrator and payment option if chosen, thecell phones and/or devices are sent an email, SMS message, or otherelectronic communication via methods described herein, with theappropriate front end software, which also includes the virtual badge.Alternatively, this process could be obtained through an on-line Appleand Android stores.

The user then opens the message and/or downloads the application, andthe front end software is downloaded into the phone and/or device, whichsoftware contains:

The virtual badge software can include any combination of the followingoptions, abilities, and features, which also may be added to and furthercustomized by an administrator via plug ins, including an administrator“ghosting” any particular selection so as to not offer certain optionsto some virtual badge users in a group, dependent on various securityissues.

“Profile Surveys”: allows users to create and complete surveys ofpersonal information which may include their additional certifications,skill-sets, interests, likes/dislikes, and preferences for matchinglogic purposes inherent in the design of the software.

“Pathfinders”: allows users to sort, select, and view other users theyhave affiliated with, as well as control privacy settings and search forand add new users or groups.

“Time-Frame Views”: allow users to view historical data that representsthe breadcrumb trail particular users traveled, based on a selected andcustomized time-frame selected by the user. This “breadcrumb trail”shall consist of but not be limited to: user/device path (represented byconnecting symbols displayed on the map), form submissions, notes,events, and work orders submitted within the time frame selected.

“Main Menu”: allows users to perform various submission-relatedfunctions in the software, including but not limited to: filling outforms (with or without photos), submitting a note, creating an event,completing profile surveys, and marking a place on the map.

Clock In/Out”: allows users to clock in or out of their variousaffiliations, meaning that a user is able to manage their privacy andsubmission settings for all affiliations the user belongs to. “ClockingIn” represents enabling the authorized affiliation to view the user onthe map and view submissions that are sent to this affiliation, while“Clocking Out” represents disabling the authorized affiliation fromviewing any user-related information, including but not limited to: GPSlocation, Data Submissions, Location Information, and Messaging.

“Sign Out”: allows users to end their current session, which turns offthe client-server connection and shuts down the application.

“Organization and Assignment Screen”: allows users to easily creategroups, teams, and task forces to organize and manage their users. TheOrganization and Assignment Screen also allows users to be tasked forfunctional purposes, by allowing users to be assigned to Tasks, Needs,Work Orders, Events, Affiliations, and potentially other uses. Users maybe organized and assigned to tasks via a “Drag and Drop” interface.Users may be sorted based on their profiles, skill-sets, ICScertifications, or other classifications via “Matching Logic”.

“Forms”: Modern Smart phones can be programmed with this system tocreate a unit's custom forms. Forms also can be customized readily onthe laptop “server” or via administrative access at the base station andwhich optionally may integrate the text messaging feature of cell phonesto complete certain information on the forms such as name and address.These forms consist of several different types of template “formfields”, which are preset data-entry methods on the cell phone. These“form fields” may be customized to collect a wide range of informationand the user may choose to assign branching logic or decision pointlogic in the forms. Comment sections can allow the user to enter anytexted wording the mobile user desires. Alternatively, the forms canemploy dropdown menus for pre-programmed answers which can be selectedto standardize certain responses so as to increase the speed of entry ofdata by mobile users. For example, there can be a “minor damage or majordamage” drop down option to select. When the form is submitted to besaved into the phone (or into the server if the cellular network isfunctioning), the system automatically geocodes and time/date stamps theinformation contained on that specific form. The forms may alsooptionally attach geocoded photos to the information so a picture canprovide reference to the form information. On the display of a form, theicon can be programmed to be highlighted with varying colors on a map.Alternatively, thumbnail photos might be displayed on a map, again withprogrammed highlighting with varying colors. Said highlighting mayindicate a priority of a need at that location or level of damage, withthe color groupings being sortable on the map to allow for quickervisual analysis. Prior to saving the form, the user is asked if the formneeds any final editing before being saved.

“Matching Logic”: refers to complex software algorithms that classifyusers based on their responses to profile surveys, allowing for users tobe matched to appropriate Tasks, Needs, Work Orders, Events,Affiliations, and potentially other uses because the users' skill-setsmatch with the services needed. Users may be classified based oncustomizable information, (Ex—Profile surveys may classify based onfunctional skill-set, such as medical, physical, technology, leadership,etc.), and a corresponding Task, Need, Work Order, or Event may becustomized to need one of these functional skill-sets. The appropriateusers may then be matched to the appropriate Task, Need, Work Order,Event, or Affiliation. Likewise, as a user completes more details ofhis/her own profile and skill sets, that user may be better “matched”with a group or organization which has listed its own set of profilesinto the system in its own search for like-minded or like-skilled users.

“Who Can See Me”: refers to an ability in the software that grants theuser the ability to disallow other users from viewing or receiving GPSdata, submission data, and any location information about the particularuser (ex—User A turns off User B's ability to see User A on the Map aswell as any of User A's information).

“Friends”: refers to users that the end-user has added to theirapplication in terms of receiving tracking and electronic submissiondata. Users are assigned “Friend Codes”, which are unique identifiersthat allow for user search to take place and for user createdsub-groups.

“Notifications”: allow users to view at-a-glance any status updates orpertinent information from selected users, and functions as arudimentary news feed to the user, displaying updated information aboutthe user's affiliations, coworkers, friends, and family.

“Synch Now”: allows the user to synch the cell phone with the laptopserver or cloud server by utilizing either BLUETOOTH®, wirelesstechnologies, or cellular networks.

“Start Break”: allows the user to note a break time start and stop pointto monitor his/her work cycle during the operations.

“Message”: allows the cell phone operator or base server to text messageeach other or other operators via a canned, preprogrammed or custommessage. Text messaging in a disaster environment can occur overpartially destroyed cellular networks where voice communication hasfailed entirely.

“Setup”: allows the user to enter into their cell phone the phone numberand company name or name of the agency for which they are working.

“Change User”: allows the user to change his/her password or user name.

“GPS”: allows the user to check the status of the GPS tracking unit andnote any errors in communication of the GPS chip within the cell phone.

“Map”: allows the user to view a map as loaded by the system into thecell phone.

“Map Trail”: allows the user to randomly drop points on a map, whichoption triggers a call to connect a line of such GPS points so as todisplay a distinct and measurable line on the back end displayed map. AStart and Stop dropdown use can map the location and distance of aflooded roadway, for a base unit to display to the administrator foractionable data.

“BLUETOOTH® Sync”: allows the user to toggle between using justBLUETOOTH® or just the cellular phone network, depending on thecircumstances.

“Diagnostics”: allows the user to view his/her name, phone number,software application name, version of the software application, synchinterval, last synch time, last upload time, number of synchs syncherrors, and message counts collected by that user.

“About”: allows the user to view the name of the system, the contactinfo, and the version, along with a copyright date.

“Shutdown”: allows the user to shutdown the software (again, in certaincircumstances, an administrator may ghost out this option so a usercannot select the option).

Because the virtual badge is designed to be mapped and tracked (thoughGPS mapping is not a requirement of the virtual badge), the data ismapped out on a GPS mapping system which allows shape files to beoverlaid for analysis. Further, the latitude-longitude information canbe converted automatically within the system to the National Grid Systemwhich is used more by military responders. Likewise, the system may beintegrated with a wide variety of software mapping systems to ensureinteroperability. Additionally, the system can easily convert all of thecollected data into Excel spreadsheets, which then are easily sortedusing Excel technologies. Data can then be e-mailed out in a readilyworkable solution and/or can be converted into pie charts or othergraphic images using, for example, Microsoft Access® to present asnapshot picture of thousands of data inputs from a single or multipledays' operations. Data can also be exported in a number of otherformats. This back end part of the system is critical to make the“tsunami of data” easy to interpret for an administrator at any point intime.

Several features originally disclosed in the '440 patent and associatedpatent applications are currently described herein, as any one orcombinations thereof can be adapted to be a part of the system, method,or devices for an electronic identification system using a virtualbadge. The various devices described or contemplated therein areillustrative examples of electronic display devices and methods of usewhich can be incorporated with the virtual badge.

FIG. 1 illustrates an illustrative example of a portable GPS receivercombined with a radio transceiver into one unit 10. A plurality of othersimilar GPS/radio units 10A-10G communicate with each other utilizing acommunications network 12, as illustrated in FIG. 2B. The GPS/radiounits 10A-10G determine their various locations utilizing GPS, and canthen transmit these locations to the other units over a wirelessnetwork. In this manner, the locations of all the units can bedetermined and monitored by any one of the units. The preferredembodiment of the present invention is also provided with a radio. Theunits can also communicate with each other over a public radio networksuch as FRS, GMRS or iDEN.

Referring to FIGS. 1 and 2A, the GPS/radio of the present invention willnow be described. The GPS/radio unit 10 includes a GPS receiver 14, aGPS antenna 16, a radio transceiver 18 and an antenna 20 all mounted inor on the GPS/radio housing 22. The GPS receiver is electronicallycoupled to processor 24 which in turn is electronically coupled to amemory 26. The memory 26 can be built into the unit 10 or removablyconnected thereto, such as a flash memory stick or removable cartridge(both not shown). The memory will normally contain the informationnecessary to operate the unit 10. The memory can also be used to storecartographic data (electronic maps), waypoints or locations which theunit's operator wants to save, waypoints of the other units and otherdata which may be input into the unit 10. The radio transceiver 18 iselectronically coupled to the processor 24 and a data modern 28. Thedata modem is utilized for transmitting and receiving data such aslocation data of the units.

The electronic maps stored on the removable memory devices can bereadily displayed on the unit's display 36. Waypoints or areas traversedby the unit and stored in the memory can also be displayed on thedisplay 36. In a preferred embodiment, the display 36 is a liquidcrystal display (LCD) and is used to display other information inaddition to navigational information. Any other type of display may alsobe used. The unit 10 also includes a microphone 30, a speaker 32 and aninput 34. The microphone 30 and speaker 32 are conventional and can bethe same type of microphone and speaker used on a conventional FRS orGMRS radio.

Input 34, in a preferred embodiment, is an alphanumeric keypad such asthe keypad used on telephones. This permits the entry of letters,numbers and any other symbols found on keypads. Utilizing specialsoftware, almost any number, letter or symbol can be entered into theunit. This type of software is commonly available on cellulartelephones. The input 34 could also be a microphone, a voice recognitioninput, a touch screen, a full keyboard similar to a BLACKBERRY® or amenu driven display screen.

The GPS/radio unit also could include a continuous tone coded squelchsystem (CTCSS) 38 and a push-to-talk button 40. The CTCSS controls theaudio output of the speaker so that only a desired transmission can beheard by the user of the unit 10. The push-to-talk button 40 can be anyconventional pushbutton switch or control device normally found on shortrange two-way radios. The push-to-talk button 40 is coupled with theprocessor 24 to combine two important functions in a single button. Thepush-to-talk button 40 is operable to both initiate transmission ofvoice communications and transmission of a radio signal which indicatesthe GPS location of the unit. Additionally, this feature permits updatedlocation information to be automatically transmitted each time the usertransmits a voice transmission.

Activation of the push-to-talk button can also trigger a transmission ofa radio signal including GPS derived location data indicating thelocation of the unit transmitting the radio signal. This transmissionoccurs normally shortly after the voice communications are complete andthe push-to-talk button has been released. The processor 24 keeps theradio transceiver enabled for approximately 100-300 milliseconds toallow the transmission of the location data. The GPS/radio unit 10 canalso include another feature which enables other individuals todetermine its location. This is a “polling” feature wherein one unit 10sends a request to the other unit's 10A-10G for them to transmit theirlocations back to the requesting unit. This request can be performedmanually by the operator of the requesting unit 10 or the requestingunit can be programmed to perform this operation automatically atpre-selected time intervals. The locations of the other units 10A-10Gare updated on the electronic map of the requesting unit so that at anytime all the units can know where all the other units are. Any and allof the units can perform this location request. If the units areprogrammed to perform this automatically, then no input is required byany of the operators.

Another optional feature of the GPS/radio unit and/or cell phone is acoding or encryption system. This system can employ any of the knowncoding or encryption schemes such as public or private key encryptionmethods. To employ this feature, a group of GPS/radio users would enteran agreed upon code into their units prior to use. The code would thenencrypt the transmitted location data and the receiving units would beable to decrypt this information. This prevents other, unauthorizedunits from tracking the location of other units. This can be useful withgroups such as law enforcement individuals.

After these modifications have been performed, the team members go outinto the designated search areas with their portable hand held GPS/radiounits. At the beginning of every day a different route or search area isprogrammed into each unit, as well as different forms or work orders.Preferably each team will have the same route or search area anddifferent teams will have different routes or search areas. As the teammembers cover the routes or search areas they will encounter individualsor locations which require specific needs. Various services to respondto these needs in disasters have been designated as Emergency SupportFunctions (ESF) and categorized with possible uses as follows (notingthese ESF descriptions listed can vary state by state):

ESF #1: Transportation: Monitoring assets and equipment, transportationsafety, movement restrictions and damage impact and assessment.

ESF #2: Communications: Supplement existing systems without overwhelmingcapacity given a large scale operation.

ESF #3: Public Works and Engineering: Locating infrastructure protectionand emergency repair, including roads, bridges, potable water,sanitation, utility grid emergency needs.

ESF #4: Firefighting: First responder's monitoring and coordination forincoming, out of region, fire rescue services following any disaster.

ESF #5: Emergency Management: Coordination and command resources,monitor and assign assets, and incident action planning.

ESF #6: Mass Care, Housing and Human Services: Follow up specialtyresources as identified by first response teams with software waypointsystem.

ESF #7: Resource Support: Logistics location, monitoring, dispatch anddistribution, with emphasis on personnel from out of the area responseteams within a given disaster zone.

ESF #8: Public Health and Medical Services: Logistics location includingpharmaceutical supplies and medical personnel management; D-Mort serviceteams' and EMS personnel locations and assignments and preciselocations.

ESF #9: Urban Search and Rescue: Accurate resource management anddetailed tracking and mapping for 100% coverage of the affected areawithout costly re-searching areas previously covered.

ESF #10: Hazardous Materials: Locate and identify the precise locationof various threats. Monitor and mitigate the needs to suppress thesethreats and prioritize the threats.

ESF #11: Food, Water and Natural Resources: Locate sources for mass foodand water resources by sector. Food safety and security; locate historicproperties protection and nutrition assistance.

ESF #12: Energy: Coordinate, dispatch, monitor and locate emergencyenergy needs and response units.

ESF #13: Military Affairs: Public safety and security—incoming units canbe universally tracked and monitored for efficient management, includingusing military personnel for various other ESF function needs asrequired, including traffic management operations.

ESF #14: Public Information: Locates informational needs by streetaddress and available resource allocation distributions.

ESF #15: Volunteers: Volunteer management of incoming personnel andresources to be distributed across ESF functions as needed using locatorsource system.

ESF #16: Law Enforcement: Coordinate the mobilization of law enforcementand security resources.

ESF #17: Animal Protection: Provide rescue, protective care and feedingfor animals using GPS locator assistance.

ESF #18: Business and Industry and Economic Stabilization: Coordinatethe response of State agencies in assisting local economic redevelopmentvia locator source system.

In addition to associating an ESF number with a waypoint, wherein aparticular need or service has been identified by the searcher, a 1-2word descriptor can also be associated with the waypoint. This wouldhelp to clarify any ambiguities that a third party may have regarding aparticular waypoint and emergency service that was associated with thewaypoint. These descriptors could also be used to identify a particularneed or resource that would be required at a particular area or site.

With reference to FIG. 3, the operation of a typical search wouldproceed as follows. The base unit is uploaded with a map of the countyor area surrounding the site of the disaster at 50. The individual teamGPS/radio and/or cell phone units are uploaded with pre-programmedcontrols and settings at 52. The individual team units are uploaded witha specific target search map for one day at 54. The base unit checks thepolling tracking features of the units at 56. The team leader checks theradio communications between his unit, the team members units and thebase station at 58. These radio communications can be in UHF, VHF or 800MHz frequencies as well as the IDENT network. The polling feature of thefield units is set for 15 minute intervals at 60. After the teams reachthe target or search area, they switch their radios to operate on theFRS radio frequency at 62 or rely upon the iDEN system. The team leaderpolls the team members on the FRS frequency or iDEN during the searchingoperations at 64. Whenever they reach a trouble spot the team membersenter a waypoint, ESF number and descriptor into their individual unitsat 66. The team leaders communicate with each other over the FRSfrequency or iDEN while in the search area at 68. The team leaderreports in to the base station over the UHF, VHF or 800 MHz frequenciesor iDEN when they are within range of the base station at 70. The teammembers upload the routes covered, searched areas and waypoints fromthat day to the base station at 72. While the upload is preferablypreformed wirelessly, any other type of data transfer is acceptable.These routes or search areas may be color coded. The data uploaded intothe base station unit is analyzed and the next day's search areas orroute are determined at 74. The new search areas or routes are uploadedinto the teams' individual GPS/radio units at 76 and the procedure thenreturns to step 56. While the new routes are preferably uploadedwirelessly, any other type of data transfer is acceptable.

With reference to FIG. 4, the procedure of a typical cleanup operationafter a disaster is described. The base unit is uploaded with a map ofthe county or area surrounding the site of the disaster at 80. Thesubcontractors' units are pre-programmed with controls, settings andcolor codes at 82. The subcontractors' units are uploaded with aspecific maps, target areas, forms and notes for the day at 84. The baseunit checks the polling tracking feature of the individual units at 86prior to dispatching the subcontractors. The safety officer checks theUHF, VHF or 800 MHz frequency or iDEN communications feature of theindividual units at 88 which are GPS/radio and/or cell phone units. Oncewithin the target area, the subcontractors' units are switched tooperate on the FRS radio frequency or iDEN at 90. Each subcontractoruses the waypoint locator to indicate a pickup site and the specificneeds at each site at 92. The subcontractors proceed to a temporarydebris site within the target area. At this location the waypointinformation which they have collected that day is downloaded to a unitat the temporary debris site via BLUETOOTH® communications at 94. Thisinformation is subsequently sent to a base station through the bestmethodology available during that moment in time, included but notlimited to wireless or cellular data transfer as well as BLUETOOTH®technology. The subcontractor continues to direct the subcontractorunits through the target area via FRS radio or IDEN at 96. At the end ofthe day the subcontractor units return to the base station andautomatically download their tracking and waypoint information to a basestation unit via BLUETOOTH® communications at 98. The data is analyzedand new maps, target areas, forms and notes are prepared for the nextday's operation at 100 and the procedure then returns to step 84.

With reference to FIG. 5, the operation of a typical insurance company'sadjuster's visit to a disaster area is described. The base station unitis uploaded with a map of the county or area surrounding the site of thedisaster at 102. The individual insurance adjusters' GPS/radio and/orcell phone units are uploaded with pre-programmed controls, settings andcolor codes at 104. The team leaders assign the insurance adjusters atarget area, and the adjusters' GPS/radio units are uploaded with thespecific target areas to be covered that day at 106. The base stationunit checks the polling tracking feature of the adjusters' units at 108,prior to dispatching the adjusters. The safety officer checks the UHF,VHF or 800 MHz frequency radio or iDEN communications between theGPS/radio units at 110. After the insurance adjusters have entered thetarget area, they switch their radios to operate on the FRS radiofrequencies or iDEN at 112. Each insurance adjuster uses the waypointlocator feature of their GPS/radio unit to locate each policyholder'sproperty address and confirm the actual visit to the site at 114. Theadjuster can then make notes regarding damages to the property in theirown computers or other devices. The insurance adjusters return to thebase station and the information contained in their units is uploadedinto the base station unit via BLUETOOTH® communications at 116. Thedata is analyzed and the following day's target areas are determined bythe insurance coordinator. New maps and target areas are prepared forthe following day at 118 and the procedure then returns to step 106.

In addition to the users listed above, this system can be employed byany and all members of a first responder services such as HomelandSecurity, the military, the National Guard, Hazardous Material teams,non-governmental responders, volunteer groups, long term recoveryorganizations, public works department personnel, private sectorresponders, all other ESF personnel, and the Emergency ManagementAssistance Compact (EMAC). These individuals and associations willnormally use the present invention to assist in the recovery,assistance, and cleanup after natural disasters such as hurricanes,tornadoes, floods and snow storms. However, the present invention can beused for any situation wherein a number of people require assistancelike fires, power blackouts, etc., or just as a networking system.

A portable cell phone 210 equipped with GPS and GPSfunctions/capabilities as well as BLUETOOTH® is illustrated in FIG. 6. Aplurality of other similar cell phones 210A-210 G communicate with eachother utilizing a communications network such as cell towers 212, asillustrated in FIG. 8B. The cell phones with GPS 210A-210G determinetheir various locations utilizing GPS, and can then transmit theselocations to the other units over a network, if it is functioning. Ifthe cellular network is not functioning, the center of thecommunications network shown on FIG. 8B as 212 becomes a server and/orlaptop “server,” instead of the cell tower system being thecommunications network. Either way, when the units are within range of anetwork 212, all the units 210A-210G can be determined and monitored byany one of the units. The plurality of cell phones is thus able tocommunicate with each other. Alternatively, they can also communicatewith a base station. This feature enables the plurality of users of thecell phones to continue to perform their tasks even when they cannotestablish communication with a cell phone network via a celltransmission tower. In areas which have recently been devastated bynatural disasters, such as hurricanes, cell phone towers have beendestroyed. The system of the present invention enables first respondersand other personnel to communicate with each other and with a basestation or headquarters when the only form of communication is the cellphones the first responders or other personnel are equipped with. Thecommunications between the cell phones are both voice and data. Thesystem of the present invention also enables a search and recoveryoperation to be established quickly with minimal expense and setup time.

Referring to FIGS. 6 and 8A, the cell phone with GPS of the presentinvention will now be described. The cell phone with GPS unit 210incorporating BLUETOOTH® technology includes a GPS receiver 214 and aGPS antenna 216 mounted in or on the cell phone housing 222. The GPSreceiver is electronically coupled to processor 224 which in turn iselectronically coupled to a memory 226. The memory 226 can be built intothe unit 210 or removably connected thereto, such as a flash memorystick or removable cartridge (both not shown). The memory will normallycontain the information necessary to operate the unit 210. The memorycan also be used to store cartographic data (electronic maps), waypointsor locations which the unit's operator wants to save, bread crumbs ofthe operator's tracks, waypoints of the other units and other assessmentdata, including but not limited to customized forms, notes, events,messages, and work orders, which may be input into the unit 210. Thecell phone is electronically coupled to the processor 224 and a datamodem 228. The data modem is utilized for transmitting and receivingdata such as location data of the units.

The electronic maps stored on the memory devices can be displayed on theunit's display 236. Waypoints or areas traversed by the unit and storedin the memory can also be displayed on the display 236. In a preferredembodiment, the display 236 is a liquid crystal display (LCD) and isused to display other information in addition to navigationalinformation. Any other type of display may also be used on the cellphone. The unit 210 also includes a microphone 230, a speaker 232 and aninput 234. The microphone 230 and speaker 232 are conventional.

Input 234, in a preferred embodiment, is an alphanumeric keypad such asthe keypad used on telephones. This permits the entry of letters,numbers and any other symbols found on keypads. Utilizing specialsoftware, almost any number, letter or symbol can be entered into theunit. This type of software is commonly available on cellulartelephones. The input 234 could also be a microphone, a voicerecognition input, a touch screen, a full keyboard similar to aBLACKBERRY® or a menu driven display screen.

The cell phone with GPS unit 210 can also include a continuous tonecoded squelch system (CTCSS) 238 and a push-to-talk button 240. TheCTCSS controls the audio output of the speakers so that only a desiredtransmission can be heard by the user of the cell phone 210. Thepush-to-talk button 240 can be any conventional pushbutton switch or acontrol device normally found on short range two-way radios. Thepush-to-talk button 240 is coupled with the processor 224 to combine twoimportant functions in a single button. The push-to-talk button 240 isoperable to both initiate transmission of voice communications andtransmission of a radio signal which indicates the GPS location of theunit. Additionally this feature permits updated location information tobe automatically transmitted each time the user transmits a voicetransmission.

Activation of the push-to-talk button can also trigger a transmission ofa radio signal including GPS derived location data indicating thelocation of the unit transmitting the radio signal. This transmissionoccurs normally shortly after the voice communications are complete andthe push-to-talk button has been released. The processor 224 keeps theradio transceiver enabled for approximately 100-300 milliseconds toallow the transmission of the location data. The cell phone with GPSunit 210 can also include another feature which enables otherindividuals to determine its location. This is a “polling” featurewherein one unit 10 sends a request to the other unit's 210A-210G forthem to transmit their locations back to the requesting unit. Thisrequest can be performed manually by the operator of the requesting cellphone 210 or the requesting unit can be programmed to perform thisoperation automatically at pre-selected time intervals. The locations ofthe other cell phones 210A-210G are updated on the electronic map of therequesting unit so that at any time all the units can know where all theother units are. Any and all of the units can perform this locationrequest. If the units are programmed to perform this automatically, thenno input is required by any of the operators.

Cell phones with GPS units which include all of these features arecomplicated to operate and numerous intricate operational proceduresmust be memorized and/or deciphered to obtain the desired results. Manyindividuals who are involved in search operations after disasters suchas hurricanes are ordinary individuals who are not familiar with theoperation of these cell phones. Therefore, for the missions to besuccessful, these units need to be modified so that anyone could readilyoperate them.

Using as an example the Motorola Brute, Sanyo Model 7050, Pro 200 or 700cell phones, the following modifications to the software in these cellphones are made prior to its use in the operations. Once thesemodifications have been made they do not need to be changed except asthe user goes into and out of a working cellular network (or the networkis re-established by repairs). These modifications can also be madeutilizing BLUETOOTH® communications from a base station or on the cellphone unit itself if the model has such capability. As another example,a BLACKBERRY® Curve Model 3330 GPS/cell phone can also be used whenmodified as stated above, and with additional programming and/ormodifications as well as newly developed cell phone hardware, a host ofother phones can utilize this system. Newer cell phone models such asAndroid and iOS based devices may not require extensive modification toutilize their Bluetooth® or GPS functions in a disconnected environment.The cell phones with GPS and BLUETOOTH® are uploaded with the PathfinderTask Force Eureka software which contains the following options,abilities, and features: “Forms”, ‘Pathfinders”, ‘Time Frame Views”,‘Main Menu”, “Clock In/Out”, “Sign Out”, “Who Can See Me Know”,“Notifications”, “Synch Now”, “Start Break”, “Message”, “Message”,“Setup”, ‘Change User”, “GPS”, “Map”, BLUETOOTH® Synch”, “Diagnostics”,“About”, “Shutdown:, “Friends” as described previously. Additionaloptions, abilities and features include:

“Work Orders”: can be tasked out to individual cell phones. Detailedinformation such as location, specific needs, tasks, or any “work”duties can be sent from the server to one or multiple cell phones viathe system. Once sent to a phone or phones, the user has the ability tocomment and enter in completion information on the work order, whichthen can be transmitted back to the base server, with automatedtime/date stamps that are geocoded at that location.

“Events”: allows mobile users to create, invite, and confirm attendancefor “Events”, which are specified locations with time/date informationattached within, including a description of activities and purpose.

“Notes”: allows mobile users to create and submit text and photoswithout predetermined formatting. Mobile users may choose to submitnotes privately or to any Affiliation they belong to.

“Profile Surveys”: allows users to create and complete surveys thatprofile their skill-set, interests, likes/dislikes, and preferences formatching logic purposes inherent in the design of the Pathfinders TaskForce software.

“Places”: allows users to create and view locations specifically markedon a map. Users may share these “Places” with other users, andadministrators may mark special places of interest for their users.

“Data View”: allows users to easily access, view, and interpret GPS,submission, and location data as it appears on the map. The Data View isa front-end feature that displays selected map information in astandardized format on the cell phone.

“Aggregate Data Button”: allows users to access a grid-style view ofGPS, submission, and location data in chronological order. Thisinterface provides users with the ability to sort and filter submittedinformation based on pre-determined attributes as well as allowing usersthe ability to export this information in a number of formats,compatible with 3^(rd) party software including but not limited to:Microsoft Excel, Tableau Server, Tableau Desktop, VirtualUSA, ArcGIS,ArcMAP Google Earth Pro, and Crystal Reports.

“Form Creator”: allows users to create Forms and Profile Surveys, whichare accessed by authorized users to fill out and complete. This FormCreator shall be accessible via the web and mobile platforms, andutilizes a “Drag and Drop” interface to create Forms to capturecustomized information via a multitude of different “Field Types”. TheseForms must be “Deployed” before additional users may utilize the Form.

“Field Types”: refer to the different types of information the user isable to capture. These Field Types include but are not limited to:Alphanumeric Entry, Numeric Only Entry, Single-Select Multiple ChoiceEntry, Multiple-Select Multiple Choice Entry, Geotagged Photo Upload,Geotagged Photo Attach, Checkbox, Radio Button, Signature Capture,Barcode Scan, and Submit Button.

“Deploy Forms”: refers to granting certain users, groups, andaffiliations authorization to submit a particular Form. Forms must beDeployed before any user other than the creator to submit, and thus,Undeployed forms are listed as “Draft”.

“Organization and Assignment Screen”: allows users to easily creategroups, teams, and task forces to organize and manage their users. TheOrganization and Assignment Screen also allows users to be tasked forfunctional purposes, by allowing users to be assigned to Tasks, Needs,Work Orders, Events, Affiliations, and potentially other uses. Users maybe organized and assigned to tasks via a “Drag and Drop” interface.Users may be sorted based on their profiles, skill-sets, ICScertifications, or other classifications via “Matching Logic”.

“Matching Logic”: refers to complex software algorithms that classifyusers based on their responses to profile surveys, allowing for users tobe matched to appropriate Tasks, Needs, Work Orders, Events,Affiliations, and potentially other uses because the users' skill-setsmatch with the services needed. Users may be classified based oncustomizable information, (Ex—Profile surveys may classify based onfunctional skill-set, such as medical, physical, technology, leadership,etc.), and a corresponding Task, Need, Work Order, or Event may becustomized to need one of these functional skill-sets. The appropriateusers may then be matched to the appropriate Task, Need, Work Order,Event, or Affiliation. Likewise, as a user completes more details ofhis/her own profile and skill sets, that user may be better “matched”with a group or organization which has listed its own set of profilesinto the system in its own search for like-minded or like-skilled users.

After an operational duty has been inputted, with any related maps, theresponder goes out into the designated search areas with the cell phonewhich has GPS features and functions. At the beginning of every day adifferent route or search area is programmed into each cell phone.Preferably, each team will have the same route or search area anddifferent teams will have different routes or search areas. As the teammembers cover the routes or search areas they will encounter individualsor locations which require specific needs. These items can be inputtedinto the cell phone in the methods described above.

The system also can recognize and list the Emergency Support Functions(ESF) and categorize (ESF 1-18) with possible uses as describedpreviously:

With reference to FIG. 9, the operation of a typical search wouldproceed as follows. The base unit is uploaded with a map of the countyor area surrounding the site of the disaster at 250. The individual teamcell phones are uploaded with the Pathfinders Task Force Eureka softwareand with pre-programmed controls and settings at 252. The individualteam units are uploaded with a specific target search map for one day at254. The team members upload the routes covered, searched areas,assessment data, and waypoints from that day to the base station at 272.While the upload is preferably preformed wirelessly, any other type ofdata transfer is acceptable. These routes or search areas may be colorcoded. Any photos taken using the software can be tied directly to arelated, custom form, all of which, when saved, is automaticallytime/date stamped and marked with that location via GPS. The datauploaded into the base station unit is analyzed and the next day'ssearch areas or route are determined at 274. The new search areas orroute are uploaded into the teams' individual cell phones at 276 and theprocedure then returns to step 256. While the new routes are preferablyuploaded wirelessly, any other type of data transfer is acceptable.

With reference to FIG. 10, the procedure of a typical cleanup operationafter a disaster is described. The base unit is uploaded with a map ofthe area surrounding the site of the disaster at 280. Thesubcontractors' units are pre-programmed with Pathfinders Task ForceEureka software and with controls, settings and color codes at 282. Thesubcontractors' units are uploaded with a specific map or target areafor the day at 284. The safety officer checks the UHF, VHF or 800 MHzfrequency communications or iDEN features of the individual cell phonesat 288. The subcontractors proceed to a temporary debris site within thetarget area. At this location the waypoint information which they havecollected that day is downloaded to a unit at the temporary debris sitevia BLUETOOTH® communications at 294. This information is subsequentlysent to a base station. Any photos taken using the software can be tieddirectly to a related, custom form, all of which, when saved, isautomatically time/date stamped and marked with that location via GPS.At the end of the day or during the work cycle, the subcontractor unitsreturn to the base station and automatically download their tracking andwaypoint information to a base station unit via BLUETOOTH®communications at 298. Alternatively, a field server may be deployedwith the software loaded into it to afford mobile users a remotedownload location without returning to a base. The data is analyzed andnew maps and target areas are prepared for the next day's operation at300 and the procedure then returns to step 284.

With reference to FIG. 11, the operation of a typical insurancecompany's adjuster's visit to a disaster area is described. The basestation unit is uploaded with a map of the area surrounding the site ofthe disaster at 302. The adjuster's units are pre-programmed withPathfinders Task Force software and with controls, settings and colorcodes at 304. The team leaders assign the insurance adjusters a targetarea to be covered and the adjusters' cell phones are uploaded withpre-programmed controls, settings and color codes at 306. Each insuranceadjuster uses the waypoint locator feature of their cell phone with GPSto locate each policyholder's property address and confirm the actualvisit to the site at 314. The adjuster can then make notes regardingdamages to the property in their own computers or other devices. Anyphotos taken using the software can be tied directly to a related,custom form, all of which, when saved, is automatically time/datestamped and marked with that location via GPS. The insurance adjustersreturn to the base station and the information contained in their unitsis uploaded into the base station unit via BLUETOOTH® communications at316. Alternatively, a field server may be deployed with the softwareloaded into it to afford mobile users a remote download location withoutreturning to a base. The data is analyzed and the following day's targetareas are determined by the insurance coordinator. New maps and targetareas are prepared for the following day at 318 and the procedure thenreturns to step 306.

In addition to utilizing cell phones to implement the system of thepresent invention, smart phones, such as the iPHONE® and tablet personalcomputers, such as the iPAD® can also be utilized to implement thesystem of the present invention. FIGS. 7A and 7B illustrate the frontand back of a typical smart phone 301. The front of the smart phoneincludes a screen 303 which displays images and data obtained by thesoftware programs of the smart phone. Buttons or controls 305, 4 ofwhich are illustrated, extend along a lower portion of the smart phone.These buttons or controls are employed to perform different functions,depending on the software within the smart phone. A speaker 307 islocated proximate an upper portion of the smart phone. This speaker isnormally used to broadcast audio transmissions received by the smartphone. The smart phone is preferably encased in a material 309 whichprotects the smart phone from damage. A camera 311 is located on therear portion of the smart phone. The camera is used to record videoimages for retention on the smart phone or transmission to anotherlocation. Each photo taken using the software can be tied directly to arelated, custom form, all of which, when saved, is automaticallytime/date stamped and marked with that location via GPS. A connection313 on an upper portion of the smart phone enables auxiliary devices,such as ear buds, to be connected to the smart phone. Another control315 is located along a side of the smart phone. Control 315 is similarto controls 305.

A tablet personal computer, such as an iPAD®, is illustrated in FIG. 7C.The tablet computer 318 includes a screen 322 on the front of thecomputer. The screen 322 displays images and data obtained by the tabletcomputer. A control button 323 is located on the front of the tabletcomputer and in a lower portion thereof. Control button 323 is used toselect certain options available within the software on the computer.The options can be, for example, Go Back, View the Operating System MainMenu, Search, etc. The control button is similar to the controls 305 and315 on the smart phone. Button 323 can perform many different functionsdependent upon the software operating within the tablet computer. Acamera 325 is located in an upper portion of the front of the tabletcomputer 318. The camera is used to record video images for retention onthe tablet computer or transmission to another location. Each phototaken using the software can be tied directly to a related, custom form,all of which, when saved, is automatically time/date stamped and markedwith that location via GPS. One or more speakers 326 are locatedproximate a lower portion of the tablet computer. This speaker isnormally used to broadcast audio transmissions received by the tabletcomputer. Buttons or controls 320, 321 extend along a side portion ofthe tablet computer. Button 320 can be employed to lock the computerfrom receiving any user input. Button 321 can be a volume controlbutton. These buttons or controls are employed to perform differentfunctions, depending on the software within the tablet computer. Abutton 319 on an upper portion of the tablet computer puts the computerinto a hibernation mode and awakens it from this mode. Headphone jack324, on an upper portion of the computer, permits audio output devicesto be connected to the computer.

FIG. 12 is a flow diagram illustrating how a cell phone or mobilecommunication device can be employed utilizing the present invention tomanage a workforce using virtual badges. At step 327, the user, who willbecome the administrator, creates an account via a Website. Next, at328, the user creates an “affiliation” via the Website. Then, at 329,the user downloads the appropriate application(s). Once these areinstalled, the user “clocks in” to the newly made affiliation and nowbecomes the administrator, at 330. Next, the administrator can sendrequests to all selected users and/or employees to join the affiliationat 331, and the administrator can assign virtual badges to selectedindividuals or users. Alternatively, mobile users can download theapplication to their device by a request to the administrator or bygoing to on line stores. The administrator then can create accounts forthe user and/or employees that do not already have accounts at 332.These new accounts contain affiliation and registration information. Theadministrator may choose at any step to perform a desired backgroundcheck, using a third party screening service. Then, the administratorcan create and deploy custom forms for use by mobile users with thevirtual badges in the field at 333. Next, the administrator can creategroups, events, and work orders to assign to employees at 334. Themobile users in the field then fill out forms, complete work orders andattend events via the application at 335. The administrator can view allthe affiliates, virtual badges and e-submissions via the map at 336(recalling a Smart phone supervisor can view all of a group's users withthe system). Finally, at 337, the administrator repeats steps 333 and334, while the mobile users repeat step 335.

FIG. 13 is a flow diagram illustrating non-governmental organization(NGO) volunteer management. First, at step 338, a user, who may becomethe administrator, creates an account via a Website. Next, the userregisters the NGO affiliation via the Website at 339. Then, the useruploads appropriate NGO documents to the Website at 340. The user nextsends join requests to specific users, or users may search for and jointhe NGO affiliation at 341. At 342, the users that have affiliated withthe NGO may now have access to this network and may acquire a virtualbadge, clock in or out to start and end a session. The administratoralso may choose at any step to perform a desired background check, usinga third party screening service. The administrator also may createforms, notes, events, needs, and work orders to assign to theiraffiliated users (typically volunteers for an NGO) at 343. Likewise,with the mobile user's completed skill sets and submittedcertifications, the NGO may choose to Type the mobile user, usingIncident Command System (ICS) typing guidelines. Each NGO may customizethese Typing features to meet their agency needs, but with 5-7 Typelevels, the NGO can far better pair skill sets of personnel with theneeds of the specific tasks at hand. (This Typing feature is not limitedto just volunteer operations covered in this subsection). Next, at 344the NGO affiliates receive appropriate forms, notes, events, needs andwork orders when they are “clocked in” to the NGO affiliation. Then, at345, the NGO affiliates fill out forms, complete work orders, writenotes and attend events that correspond to the NGO. At 346, allauthorized user and/or virtual badge holder locations and electronicsubmissions appear on the map for the particular NGO, corresponding tosituational awareness. Then at 347, the administrator repeats steps 343and 346 while the users repeat steps 344 and 345. Finally, at 348, theadministrator may choose to share non-personal user data with anIncident Commander (IC).

FIG. 14 is a flow diagram illustrating end user social networking. Atstep 349, a user creates an account at a Website. Then, at 350, the userdownloads appropriate mobile application(s). Next, at 351, the user logsinto the application and searches for and requests friends. Next, at352, the user creates forms, events, needs, work orders, and groups tocommunicate with the friends and may view them and their submissions onthe map. Then, at 353, the user searches for and requests to join theirwork affiliations (for example, company ABC). The user then clocks in orout to join or leave their affiliations. At 345, the user is able tohide or show their GPS location and corresponding electronic submissiondata from any user (except when work affiliations disallow this). Next,at 355, the user may complete profile surveys which help match the userto “best-fit” volunteer opportunities, businesses, places and groups. At356, the user creates an affiliation via the Website. The user selectsthe type of affiliation and selects any optional upgrades. At 357, theuser can become an administrator of the newly created affiliation, ifauthorized. Different administrative levels can allow for differentlevels of controls of the system itself Administrators may search forand request users to affiliate and users may search for and join thisaffiliation. Administrators also can track hours logged by mobile usersas well as a host of other valuable field data. In the event of anemergency situation, the user may affiliate with local governmentaljurisdiction via an alert message and affiliation request from theregional commander at 356. Finally, at 359, the user repeats steps 352,353, 354, and 356 for social networking purposes.

The virtual badge system of the present invention can be employed toprovide a functional and efficient database to serve as the repositoryfor all information gathered in the field via the cell phone and/ordevice equipped with GPS and having GPS functions with BLUETOOTH® orother wireless technology. This database shall be separated into sectorsbased on user permission and user affiliations to other organizationscontained inside the software. The system also may allow for a separatedatabase storage system at a specifically desired location, like auser's normal offices.

The virtual badge system of the present invention can also provide themeans for an authorized and affiliated Governmental entity (typically aCounty or Parish's Emergency Management Team) to control a disasterresponse operation via the cell phone equipped with GPS and having GPSfunctions with BLUETOOTH® or other wireless technology, which isinterfaced with a web-based version of the cell phone software meant foradministrative purposes. This affiliated Governmental entity (henceforthreferred to as the “Regional Commander”) may submit a mass-alert toauthorized users that serves as an “opt-in” program to the particulardisaster response operation. This ability (via the customized cell phonesoftware) allows the Regional Commander to organize and task both hisvirtual badge users of responders and what would normally be spontaneousvolunteers with no affiliation or tasking.

The virtual badge system of the invention allows users to creatediscrete groups, businesses, organizations, and affiliations via thecell phone equipped with GPS and having GPS functions with BLUETOOTH® orother wireless technology for the purpose of business management anduser privacy. Groups, businesses, organizations, and affiliations aretreated as discrete entities by utilizing the cell phone software thatcontains a private sector of the database that only authorized users mayaccess. Users may “clock in” or “clock out”, using the cell phonesoftware, to enable or disable affiliation with a group, business,organization, or affiliation.

Organization tools are also available via the cell phone equipped withGPS and having GPS functions with Bluetooth® or other wirelesstechnology, such that responders and users in the field can customizethe organization of their virtual badge users. Users have the abilityvia the system and/or cell phone equipped with GPS and having GPSfunctions with BLUETOOTH® or other wireless technology to “drag anddrop” user representations (in the cell phone or base's software) toassign them to organizations and groups, and in emergency managementevents, into chain of command charts for both paramilitary and militaryresponses.

Inventory management related tools are also available via the cell phoneequipped with GPS and having GPS functions with BLUETOOTH® or otherwireless technology, such that responders and users in the field caneasily create and maintain inventory lists for further reference. Thisgenerally applies to disaster environments, primarily for criticalinventory management, but is applicable to non-disaster scenarios. Inthis embodiment, with a plug in module, the virtual badge may containsimilar information to a person's identification data such as a photo,data, location, quantity, condition, clock in, clock out, timedmaintenance required (like servicing a generator) or expiration schedule(like medications) of inventoried assets, and/or an image like a Bar orQR code linked of the inventoried equipment, all of which can bemonitored, managed, and scanned as described herein.

The present invention can also provide a mobile credit card paymentsystem and credit card payment gateway for mobile users to processpayment via the cell phone equipped with GPS and having GPS functionswith BLUETOOTH® or other wireless technology, for purchasing the virtualbadge or for payment for jobs completed in the field. This mobile creditcard payment system and credit card payment gateway can be implementedvia pre-existing external attachments to the cell phone that allow foror by NFC or scanning technologies, including magnetic-strip cards to beread, interpreted, and processed for payment (via the customized cellphone software, credit card payment gateway, and/or database).

The present invention can also provide privacy controls via the cellphone equipped with GPS and having GPS functions with BLUETOOTH® orother wireless technology for the purpose of allowing virtual badgeusers in non-disaster purposes the ability to “hide” their location andinformation submitted from other discrete users, groups, businesses,organizations, or affiliations (subject to an administrator's approval).The nature of GPS tracking necessitates that privacy controls beimplemented via the customized cell phone software in order for theinvention to be viable on a day-to-day basis. It is yet a furtherobjective of the invention to provide the user easy means via the cellphone equipped with GPS and having GPS functions with BLUETOOTH® orother wireless technology to change settings in the cell phone softwarerelated to user Profile Information, GPS & Locations Settings,BLUETOOTH® Synchronization, Wi-Fi Synchronization, and privacy controls.All of these settings change settings in the cell phone software. Thiscan be accomplished by pre-programming a single “push button” on a cellphone or device to perform all of these functions when activated.

The present invention also provides a system and method for identifyingor classifying members of a team of virtual badge users based on theirknowledge, skills and abilities to perforin particular functions. Themembers of the team can be career responders or volunteers. The membersof the response team are preferably identified or classified into“Types” based on completion of FEMA sponsored National IncidentManagement System (NIMS) instructional and command-oriented classes,based on previous disaster response experience, or based on definedparameters by the system of the present invention. Each “Type” can havesub-categories. The following six “Types” are a preferred embodiment,though additional “Types” are also possible:

Type VI—non-registered applicants and/or responders.

Type V—Entry level. Inexperienced and untrained. Has photoidentification. Has signed an application, release, and handbook.

Type IV—Inexperienced with some training. Has completed a criminalbackground check. Completed NIMS courses IS-100.a and IS-700.a.Completion of orientation. Has photo identification. Has signedapplication, release, and handbook.

Type III—Inexperienced with some command training. Has completion ofcriminal background check. Completed NIMS courses IS-100.a, IS-200.a,and IS-700.a. Basic first aid and CPR knowledge. Completion oforientation. Has photo identification. Has signed application, release,and handbook.

Type II—Some experience with full command training. Has completion ofcriminal background check. Completed NIMS courses IS-100.a, IS-200.a,ICS-300, IS-700.a, and IS-800.b. First aid and CPR knowledge. Completionof orientation. Has photo identification. Has signed application,release, and handbook.

Type I—Extensive experience with full command training. Has completionof criminal background check. Completed NIMS courses IS-100.a, IS-200.a,ICS-300, ICS-400, IS-700.a, and IS-800.b. First aid and CPR knowledge.Completion of orientation. Verifiable field experience. Has photoidentification. Has signed application, release, and handbook.

Software contained within the cell phones or on the web-based versioncan sort the virtual badge users based on the above noted criteria,using matching logic or manually matching their skills and talents withthe needs of an organization to accomplish a job or task. The virtualbadge users can upload their National Incident Management System (NIMS)or other course certificates via a portal on the software's website orupload said documents using the cell phone software. The courses can beverified by an administrator and entered into the system via theserver-side database of the software system. This updates the system tosort and “Type” the individuals or volunteers, as well as to assist withassigning appropriate tasks to appropriately qualified virtual badgeusers. The system can be designed to send an alert to a supervisor oradministrator if a virtual badge user's certificates have expired or areinadequate for a task. For example, in working an oil spill, a virtualbadge user may need a HazMat course, and if a virtual badge user wereinappropriately selected for a task, an alert could be automaticallysent to the administrator advising of this inadequate level ofcertification of that user for that task.

The invention also provides the user with tools for integration withexisting software, via software APIs, such that the data collected viathe cell phone software system may be exported and integrated foradditional disaster response uses, reporting, analytical, or businessdevelopment purposes.

The present invention further enables 2-way satellite communication viacell phones and satellite devices that transmit data through thesatellite network as opposed to through cellular signal. These devicescan permit the virtual badge user to be “online” at all times, even whenthe device is disconnected from cell service, and will aid in disasteroperations.

The present invention also involves a process wherein a small crewand/or family unit with the virtual badge software could setuser-defined administrative settings which restrict or allow selectiveGPS visibility in the mobile and/or desktop software application. Theseuser-defined administrative settings should allow for user data in theform of geo-tagged photos, events, forms, tasks, and locations to beencrypted in the mobile and/or desktop software application before thisdata is sent to the server. As per this technical process, onlyauthorized users' mobile and/or desktop applications possess thecorresponding private key to decrypt this data. For further safety andsecurity, additional administrative settings allowing remote access tothe handset may be enabled. These additional administrative settingsinclude but are not limited to: turning on the handset microphone,either forward or backward facing cameras, and browsing history. Thisinvention therefore has administrative settings that can be enabled ordisabled in certain builds of the application. These administrativesettings further encrypt locations in the application and help ensuresafety. This process allows very strict monitoring of a small crew orfamily unit of virtual badge users by an administrator within aprotected silo.

FIG. 15 is a flow diagram illustrating work contracts and jobs, like forexample, debris haulers (or other contractor). At step 360 a usercreates account(s) via a Website. At 361, the user downloads theappropriate application(s). Next, at 362, the user registers for thework contract program via a Website. The user can now post a job for acontractor or “clock in” to their work contract program to viewpotential jobs, at 363. Next, at 364, the user may send a request viathe application to have a job completed to a particular contractor, whoconfirms this job, arrives at the location, and completes the work. Oncethe job is complete, the job requester can remit payment to thecontractor via credit card or cash at 365. If the contractor has a cardreader attached to his cellular phone, the application can handle thecredit card payment and processing and record them in a database at 366.Next at 367, the “employer” and contractor receive a confirmation viae-mail, and in their application, that signifies that the work wascompleted and paid for. At step 368, the “employer” may optionally“rate” their contractor and add to a repository of reviews viewable byany prospective “employer”. Finally, at step 369, the “employers” andcontractors may search via the application for “best-fit” jobs andspecific individuals using the system's matching logic features.

FIG. 16 illustrates a flow diagram demonstrating how an IncidentCommander (IC) can gain access to various areas and information. First,at step 370, a governmental entity creates an account via a Website.Then, at 371, the governmental entity applies for an Incident Commanderlicense. Upon receipt of the license, a new database sector in agovernment only server is created at 372. Next, at 373, a “Jurisdiction”is created and an assignment of geographical areas and user geographicaffiliation to the IC account occurs. Then the IC has access tonon-personal statistical information about all authorized users in thejurisdiction at 374. In the event of an emergency, the IC can send amass alert message (affiliation request) via the application to allauthorized users and/or virtual badge holders in the jurisdiction at375. Users who have opted into the emergency response are now affiliatedwith the IC and may now be assigned forms, work orders, notes, tasks,events, and needs for the purpose of disaster response at step 376. Alldata submitted by IC affiliated users is sent only to the appropriategovernmental database sector at 377. Then, at 378, upon conclusion ofthe emergency response, all affiliated users lose their affiliation andmay not renew their affiliation unless another mass alert (join request)is sent by the IC. Finally, at 379, all data submitted via the emergencyresponse is available to the IC to share with other sources via APIs andis available for analytical purposes. The data submitted during theemergency response is logged into a selected database and does notautomatically delete after a certain period of time.

FIG. 17 is a flow diagram illustrating a process or method on the GPSenabled phone software interacting with the software system anduploaded, local, publicly stored government data such as a local taxassessor's data information base merged into the system via an API link.Such tax data bases contain individual lot I.D. numbers, lot sizes,owner's names, addresses, contact information, often detailed floorplans, valuations, zoning, building permit information, constructionhistory, etc. Such tax maps also can reveal critical infrastructuredetails and locations as well. Step 380 illustrates an upload via an APIlink of the local county tax data base into a secondary or remote thirdparty independent data storage device such as the base station, laptopserver, or cloud server such that this information then can be populatedinto the map in the mobile and/or desktop software application. Step 381is when the technical process allows these map points to be populatedwith standardized or customized form data and tasked to users foroperational missions or jobs. At step 382, a user creates account(s) viaa Website; and at Step 383, the Administrator needs to approve thevirtual badge holder to allow access to the mobile app. At 384, thevirtual badge holder downloads the appropriate application(s), and atStep 385, the virtual badge holder “Clocks In” to the newly madeaffiliation. Step 386 shows the Administrator creating an account forvirtual badge holders that do not already have accounts. At Step 387,the Administrator or his designee can assign certain grid search areasor data survey queries to certain virtual badge holders and/or teams.The Administrator can create and deploy forms for use by virtual badgeholder and/or responders in the field at Step 388 based on the needs.Step 389 shows the Administrator creating groups, events, needs, andwork orders to assign to virtual badge holders. At Step 390, virtualbadge holders are be able to access the consolidated mobile mapping andlocal tax data on any specific lot by uploading the specific pointwithin an illustrated set of lot lines via a touch screen on the phone.Every lot on the mobile map can have such a touch point to allow theuser to pull up the background, detailed data. With the mobileapplication now revealing the lot's designated data at Step 391, thevirtual badge holder can view the Administrator's choice of fieldviewable data, which will contain form fields with either fill inoptions or drop down options to rapidly collect GPS field data aboutthat lot. Step 392 illustrates the virtual badge holder enteringwhatever from data or selecting an appropriate drop down option as maybe appropriate for that lot location. Step 393 illustrates the virtualbadge holder's mobile application calculating the data entered by thesefield observations. One example of an input could include the mobileuser's observations of the percentage of damage to the structure, whichcan be numerically entered into the form field or by selecting anappropriate drop down option, where the GPS enabled mobile applicationcan note the GPS coordinates, the time and date of the entry, and theuser ID number for subsequent accountability. The virtual badge holderalso has the option of taking photos of the lot, which photos are tiedto the form and its data. By entering a number or a drop down,pre-scripted, percentage of observed damage, the GPS enabled phonesoftware can auto-calculate the actual dollar damage estimate, based onthe local tax assessor's valuation and/or based upon the user's inputtedfield observations. After auto-calculating the damage observed, a colorcode can be associated with a predetermined damage valuation or otherneeds at GPS location. Color codes can be displayed on a map wherebydamage to a location and/or resources needed to address the specificdamage, need, or assistance to an area can be determined. Additionally,the color codes can be displayed on a mobile user's software applicationon their phone, a web application, or combination thereof. On viewing ahost of such locations on a map, color codes, and especially groups ofsimilar colors, a virtual badge holder readily could identify areas ofneed or areas with little needs. Patterns based on such group colorcodings could lead to quicker evaluations and more efficient responses.Data from the virtual badge holder's software or software applicationcan also be transferred to a remote storage device, such as the basestation, laptop server, or cloud server as described above. A designatedcolor code also can be auto-assigned to each lot ahead of sending usersout for assessments, based on the Administrator's tasking. For example,the base station, laptop server, and/or cloud server may auto-calculateand/or analyze impacts and needs to pre-defined geographic areas, withviews of groups of color codes as described above. Step 394 documentsthe mobile application uploading its field data back into the basestation, laptop server, or cloud server. At Step 395, the Administratorcan adjust the base system to consolidate all of the field data into thesystem's data base which can then be queried for any and all of thegeotagged and time date stamped data gathered from a host of users toanalyze a variety of impacts to a local community. At Step 396, theAdministrator can create a variety of map displays, color coded and datadriven, reporting forms like ICS 209 forms, graphic and tabulardisplays—all for rapid analysis of large amounts of data into simplisticdisplays for either a Command or business application. The Administratoralso could choose to display miniature thumbnail photos on the basemaps, with the photos each bordered by the same chosen color codes toagain quickly reveal patterns of lot assessments. Step 397 illustrateshow this compendium of map data can then be re-loaded via an API backinto the local county system for use by a host of responsible governmentagencies. Step 397 illustrates how the Administrator can repeat Steps387, 388, 395-397, while the virtual badge holder can repeat Steps389-394 as needed.

In yet another use of a variation of FIG. 17, a local government coulduse the same displayed methods for training, which training canintegrate with on-going research in a community. For example, if teamswere receiving training on the software system, forms could be createdwhich can survey data collection by students in the field. By targetinga certain low income community for such a training zone, a class couldcollect housing data such as the age and type of roofing, storm hardenedwindows, obvious code enforcement issues. As a result of such a survey,the local government then could use the field collected data for grantapplication, like block grant funding from the federal government, toprove for the grant application that there is indeed a justified needfor the grant monies to support. Similar data could be pre-scripted intoforms for such trainings on door to door surveys of local populations aswell, with invaluable data for collecting unmet needs, local trends, andresearch for university studies. Once again, this system used in theseexamples meets FEMA's Whole Community approach to developing suchsystems, and more day to day use like described herein offers viableuses for training opportunities for a wealth of development programs aswell.

FIG. 18 describes an illustrative process or method wherein a certainscreen or view of the handset application contains the virtual badge. AtStep 398, an Administrator creates or uploads teams, groups, volunteerorganizations, and/or local businesses plus their employees(collectively referred to as “a crew”) with unique identifiers for eachunit. As an illustrative example, for temporary access following adisaster or other emergency or for normal day to day access, Step 398could be used to upload information relating to a resident (or one ofhis/her staff members) of a barrier island community or otherneighborhood, including the address to which those users are allowedaccess. Other uses include, but are not limited to providing citizenswith temporary access to gated communities or privately restrictedareas, monitoring cruise ship passengers entering and exiting the ship,monitoring visitors to public buildings, armed services facilities,volunteers responding to disasters, and/or institutions. Step 399illustrates how each crew uploads its own pre-approved list of virtualbadge users. As an illustrative example, a response crew could uploadits crew of users. Alternatively, a homeowner on a barrier island orother neighborhood could perform this Step, if allowed by theAdministrator. The upload process would include adequate details ofbackground information to allow proper identification, such as a photoof the user, a name, date of birth, address, and/or social securitynumbers (enough information for instance of an E-verify background checkto confirm the user is a legal resident allowed to work in the UnitedStates or for a simple “wants and warrants” check by a local lawenforcement agency, all subject to the Administrator's discretion). Step400 illustrates a mobile user creating an account via a Website seekinga link to a designated crew, or other entity, or the user could receivea push notice via the mobile phone from the Administrator. At Step 401,the Administrator or his designee can perform an E-Verify backgroundcheck or criminal background check, or other type of check, as may bedesired. Step 402 shows the Administrator then needs to approve linkingthe virtual badge user to a pre-approved crew and/or home site and/orbusiness location to allow access to the virtual badge holder and mergethat user's data with its designated crew, home site, or businesslocation in the application's database. The Administrator could push thevirtual badge to the designated mobile device via the cellular networkor via Bluetooth® or other means as needed. At Step 403, the softwaresystem then auto-populates a prescribed virtual badge on the mobiledevice containing user information pertinent to the situation, asillustrated in FIG. 20, such as a photo, logos, a name, social securitynumber, gender, age, skill set, credentials, blood type, etc., alongwith its unique bar code or QR code image which may contain the samedata or more, as determined by the Administrator. This virtual badge mayalso be color coded, (see FIG. 21 where the shaded 534 region is coloredin for example red, blue, yellow, orange), corresponding to anyinformation an administrator, like ESF-16—law enforcement and security,or authorized designee sets. Alternatively, or in addition to the colorcoded region, other counter measures to counterfeiting such as the useof logos, symbols, security clearance levels, or words added to thebackground, watermarks, images, or combinations thereof, and programmedto change based on one or more factors, such as code commands orvarying, specified, time periods. At Step 404, the now approved user hasan approved virtual badge that can be displayed from his cell phoneapplication.

FIG. 19 is a block diagram of the components of the software systemprocessor with a sample of the software's plug in modules. The corecomponent of the system is the database or core code base 410. Links toa cell phone are illustrated at 412. A post a note function is shown at414. Local tax maps, maps and photographs can be associated with thedatabase 410 at 416. A search for users, an asset inventory, or otherinformation takes place at 418. Friendships are associated with thedatabase at 420 and user privacy controls which can control access tothe friendships take place at 422. Groups are associated with thedatabase 424. A user profile is established at 426. Badging andcredentialing is associated with specific users at 428. Jobs and taskswhich are required to be performed are associated with the data base at430. A form creator is associated with the database at 432. Localstorage and caching takes place at 434. Companies and networks areconnected to the database at 436. A hierarchical user structure for thedatabase is established at 438. User roles are established at 440.Network API links and/or social network links are provided at 442.

Referring to FIG. 20, a cell phone 500 with an illustrative embodimentof a virtual badge 502 is shown. The virtual badge may be shown whilestill allowing the user the capability of using the cell phone, such asmaking calls 504, ending calls 506, or applications for web-browsing508, texting 510, or gaming 512.

Referring to FIG. 21, an illustrative embodiment of the virtual badge502 as illustrated in FIG. 20 is shown. The virtual badge in the phone500, or a handset, can be designed and programmed to be functional bydisplaying fixed data or data that can be changed, include a variety ofinformation such as an image 514, a picture of the individual, a barcodeor QR code 516 (provides for additional functionality) which containsthe same and/or additional data about the user and which can be scannedfor that data on the image via another cell phone with scanningtechnology or any other scanning technology, such as barcode or QR codereaders. This virtual badge concept in this figure can be applied toboth Smart phones and Feature phones alike. In addition to the photoimages, or as part of being Federal Information Processing Standard(FIPS) Compliant, the virtual badge 500 may include details like thebadge's issuing agency name 520, expiration date 522, as well as othertext based identification, such as name of the individual 524, companyidentification 526, title 528, and phone number 530. In addition to orif the person with the visual badge is an individual, the address of thelocation the individual is allowed access to or the address at which theindividual resides 532 can be included. Such information is forillustrative purposes only and is not meant to be limiting; whateverother information or FIPS standards may be imposed can be included inthe badge.

FIG. 22 refers to an illustrative embodiment of the virtual badge on aseparate electronic display device 600. The electronic display device600 is preferably designed to be portable, small, lightweight, andinexpensive to manufacture. This device may be either linked to a cellphone via wireless technology or it can function independent of a cellphone, linked to a local Wi Fi network, which is able to monitor thevirtual badge device just like described for the cell phone virtualbadge, within that Mesh Network, as an example. The device is powercycled by holding down the control button at 602. Once the sync/controlbutton at 604 is activated by holding down the button, the device willsync wirelessly to a designated cell phone or to a WiFi network as shownat FIG. 26. At that time, a digital passcode is displayed on thedevice's screen 606. The cell phone user, a laptop server, or anadministrative server can enter in the passcode to sync to that specificdevice. Once the user is authorized to sync with the device or WiFinetwork, either the administrator will transmit the user's virtual badgedata, photos, and images into the cell phone and/or into the deviceitself wirelessly, with the new data, photos, and images now storedwithin the device's memory at 608.

The electronic display device 600 includes alternate power sources likea rechargeable battery pack 610, a USB port 612 to recharge the batteryand/or synch to a separate computing device, a power adapter 613 torecharge the battery and/or directly power the device, and a controlunit including a circuit board at 614, such as a printed circuit boardand/or a microcontroller with memory capacity to store limited amountsof data, including images and/or photos, see FIG. 25. The electronicdevice also includes the necessary associated circuitry at 616 toelectrically couple to the display screen 606, such as an LCD screen.The electronic display device 600 could be worn by the user, hangingfrom a lanyard with clips like at 618, see FIG. 24, similar to plasticbadges. For additional tracking features, this lightweight electronicdisplay device 600 also could contain an RFID or NFC chip 620, if theAdministrator so desired. The device could utilize the sync/controlbutton 604 to manually view various screens at by pressing the button(or a scroll screen as pricing for such alternatives may becomeaffordable for this embodiment). The power button 602 powers up or downthe display device 600, which button could recall the unit from a sleepmode, wherein the unit automatically transitions into a power savingmode, which time span may be pre-set by the Administrator. This devicecould be linked to the user's own cell phone, whereby the virtual badgedata and images could be transferred by Bluetooth® or Wi Fi link fromthe phone to the device. Using this method, the user's phone could becarried in its case, while the inexpensive device is hung from a lanyardso that other personnel can view the badge in the separate device.

The virtual badge displayed on the display units such as the phone asdescribed previously could also be linked to the electronic displaydevice 600 so that the image is displayed on the screen 606 viaBLUETOOTH® or other wireless technology. In this manner, the electronicdevice 600 connects to WI-FI or Mesh-WIFi network and receives thevirtual badge information relating to the user through a router 624, seeFIG. 26. The electronic display device 600 also connects to the user'scell phone 626, which transfers the virtual badge info via wirelesstechnology form the phone 624 to the electronic display device 600.

At a checkpoint where a visible inspection may be needed, the virtualbadge information would be stored on the device shown at FIGS. 22 and23. By using the power button at 602, the security person could activatethe device from its “sleep mode” into a “read mode” to allow a full viewof the data displayed on the LCD screen at 606. By using the controlbutton at 604, the security person could scroll through various screensof data on its LCD screen such as the logo screen 626, see FIG. 24, toverify the appropriate issuing agencies, and then scroll the screendisplay to show the user's personal identification data such as in FIG.25. After scanning the virtual badge as described above, on a pre-setand adjustable interval, the device would return to its “sleep mode” toconserve the battery after a pre-set time period.

As another feature in the device, when it is in sleep mode, the devicecan be programmed to display in large block letters a user'sidentification, like his or her first name or a shape or color. The LCDscreen, in its sleep mode, would have adequate back lighting to displayjust the basic block letters so that passer by personnel might readilyidentify the user and thus also authenticate that the user is in theappropriate section of the secure area or facility.

Alternatively, the device could be worn by a user and linked to a Wi Fimesh network within a facility or say, for example, a ship. Using thismethod, the device contains the same data and information as describedabove and illustrated in FIG. 21, but in this instance, no cell phone isneeded. The user still may be tracked via the RFID or NFC or other chipat 535 in the device when the user passes through pre-assigned checkpoints with readers in place.

FIG. 27 displays a chart where a user and/or business owner registersinformation, and then say, for example, trucker drivers or responderscoming from around the country into a disaster area or guests travelingfrom afar to visit servicemen in a foreign or domestic military basecould apply for virtual badge. The applicant/user could register througha web portal either their own personal information or employeeinformation at 543. This registration method could incorporate a userfee to be split between various agencies. The administrator then couldscreen the applicant/user(s) at 544, like at 401 in FIG. 18. Thisscreening may or may not include various levels of criminal backgroundchecks to account for various clearance levels. Once approved, thedriver, individual, business, resident, or serviceman is registered. Fora business or resident seeking approvals for employees and/or housestaff, the business or homeowner then would enter requested data,images, and/or photos through the administrator's web portal for asecondary approval for badges for their respective employees or stafflike at 544. A serviceman likewise could request a badge for his familyor friends to access the base this way. The user then may request topurchase or obtain virtual badge at 546. At 547, like at 403, theadministrator can customize and/or change the desired virtual badge fordifferent access protocols for various levels of badges, programmedtimed color changes of the badge, bar code or QR code styles, image datacontents, various logos, photo placement, and/or pre-set self-destructschedules. At 548 like at 402, the administrator approves or denies therequest following a payment, if needed, for the virtual badgelicense(s). Authorized users then receive either an email or text SMSwith instructions on how to download with an appropriate log incredential at 549. The virtual badge then can display on the user'sphone screen and/or the synced device's screen 606. Finally, theself-destruct “timer” within the virtual badge causes the badge toself-destruct and become reusable, unless a new payment orre-authorization is processed by the administrator/agency at 550.

FIG. 27 also displays a method of securing an approved virtual badge andcould coincide with a user in a disaster checking in to an area andsigning into to an ICS Form 211. Using the system outlined in thisapplication, the registration could be automated and auto-loaded intothe ICS 211. With the virtual badge data, an administrator could morequickly organize crews and personnel by the qualification data whichmight be collected as part of the virtual badge registration. Colorscould be assigned to Type these personnel, again to facilitateorganization of personnel. If the virtual badge was loaded into an ICS211 in an Excel format, which may include a photo of the virtual badgeuser, each badge on the ICS 211 could be designed to change colors, sayfrom green to red, to display when that user is active. This systemupgrade could add to accountability for logging in and logging out onthe ICS 211.

Once loaded into an ICS 211 in a format like Excel, the virtual badgewith a possible added unique identifier like the user's phone number'slast four digits, could be used in other ways to facilitate filling inICS forms during an incident. Using copy and paste or drag and dropmethods, an administrator could simply take a listed virtual badge fromthe ICS 211 and move it over to an ICS 204 (a work assignment sheet).Because the virtual badge user can be ranked by qualifications, crewleaders as well as crew members are more easily created in the ICS 204.Using the same methodology, an administrator can create other ICS formsas well, again relying upon the virtual badge data transfer into thevarious forms. For example, by linking a red or green color to thevirtual badge, the administrator easily can view which users are activeas well on the scene at any given moment in time based on the colorlinked to that virtual badge's listing on the various forms.

With software like Virtual Badge™ and Pathfinder Eureka® system in aCommand Post, split screen technology would allow a local commander togain far broader situational awareness. For example, one screen mightdisplay a map with all of the virtual badge users in the field. A linkedscreen could display another map with incoming geotagged and time/datestamped field photos and forms being submitted from the virtual badgeholders. Yet another screen could project thumbnail photos on the map,linked to various icons displayed on the same map, to further representincoming field data from the Pathfinder Eureka® system. These photos oricons can be ringed with selected color codes to more easily identifythe priority or level of that icon or photo, as an administrator views acollection of such icons on a map displayed in the software. Anotherscreen could display active and inactive command personnel on an ICS 203or ICS 207. An interactive ICS 209 “supplement,” in Excel or HTML formatcould be on yet another screen, allowing for monitoring events as theyunfold, and allowing for the quick assignment of personnel to incomingfield forms coming in from one field virtual badge user or crew and thenautomatically assigning another virtual badge user or crew to the taskof resolving the need at that same geotagged location. With a fullyfunctioning system integrating all the technologies described herein,with or without cell and Internet service, an Incident Commander isprovided with far greater awareness and accountability of alloperations.

In another embodiment of the system, a scanner can be attached to thecell phone directly (or through a computer on a network synced to thephone), which scanner can scan a magnetic strip of an ID like a driver'slicense. In this method, the user's license information then istransferred directly into the virtual badge. This method is yet anotheralternative, though it may not share the pass through of the data into alocal law enforcement or administrative network, which may or may not bedesired. Nonetheless, this is yet another way for the virtual badge toload data and images where low security thresholds may be acceptable. Inyet another embodiment of the system, a device like a simple I-Touch(manufactured by APPLE) with no cell capability may be tethered to a GPSdevice, if GPS is desired, and the software loaded on to this devicewould allow the device, which could be preloaded with specific data andimages into its memory, to then scan in and out virtual badges and/orinventoried assets as described herein.

For use in the 100% disconnected environment, the Bar or QR code 516,see FIG. 21, may be scanned at a check point by a guard with a Smartphone with a camera or using NFC technology, loaded with the mobilesoftware and system. The guard's Smart phone can pull up its own cacheof data information pre-loaded by the Administrator while the guard'sphone was either connected by WiFi, WiFi Mesh, Bluetooth, or cell to thesystem. On scanning the virtual badge in a location with no cell orInternet, the guard also can retrieve verification of the data set at547 on FIG. 27 like a photo, logos, a name, date of birth, and/oraddress for the guard to verify the user matches the virtual badge asdisplayed on the user's phone. In this embodiment, no cell service isneeded at the check point, whether the check point is in a disaster areawhere the infrastructure has been destroyed or in a foreign country withinadequate, incompatible cell service.

As another feature in the device, when it is in “sleep mode,” the cellphone or linked device can be programmed to display in large blockletters a short, user identification, such as his or her first name. TheLCD screen, in its sleep mode, would have adequate back lighting todisplay just the basic block letters so that passer by personnel mightreadily identify the user and thus also authenticate that the user is inthe appropriate section of the secure area.

Another advantage to this device is that when a user is finished usingthe device, the data and images can be wiped clean from the device,allowing the device to be used over and over by multiple users. Forexample as part of this method, by holding down the control buttonsimultaneously for a pre-set amount of time, the device thoroughly wouldscrub and erase all data stored in its memory at 614.

All of the tracking and mapping history of the user would be integratedinto the rest of the system defined within this application to allow formapping and data assessments. With an RFID, NFC, or other chip, usersalso could be passively tracked without the need for check pointpersonnel, thereby reducing monitoring costs while simultaneouslyincreasing the precision of monitoring due to more frequent check pointsbeing implemented. With a Wi-Fi network, as an example, coupled with anarea wide system of chip check points and overlays, the administratorcould in fact live time track all personnel within a facility, dependenton the coverage of the entire network and system. Further, with a MeshWi-Fi network, such as at a disaster or on a ship, users within thenetwork could be live tracked with the use of chip check points andoverlays, even in an environment with no cell or Internet service.

Besides use at check points on bridges approaching restricted barrierisland communities following a disaster, this system has a broad abilityto adapt to day to day uses. College campuses could use the virtualbadge for visitors or prospective applicants, who can be tracked ifdesired. Mass volunteer operations could make use of the device forshort term events like parades or festivals. Travel or Tourismfacilities could make use of the device to keep track of touristsentering or leaving a hotel or resort. Using the cell phone, NFC, orRFID tracking capability or the devices described in U.S. Pat. No.8,154,440 or related applications, the virtual badge offers the abilityto track a user throughout a network of roads and buildings spanningeven the largest of bases and/or even third world countries, whichlikely have inadequate cell tower coverage.

All facilities and/or restricted areas would benefit from a far moreaccurate method of ensuring that all users actually have exited an areathrough an exact accounting method of tracking all exiting personnel atthe end of a shift or work cycle. Even in tours of sensitive federalfacilities like The White House, where visitor information is sent to aclearing facility ahead of allowing entry, said data and informationcould be fed through the system into the cell phones and/or devices.Once activated on the day of the individual arriving for the tour, thecell phone and/or linked device can be worn on a lanyard, allowing foreasy identification of the virtual badge holder. Further, with the RFID,NFC, or other chip, remote monitors could live track all virtual badgesif so desired, or at the least, monitor all badges to make sure everyuser safely exits the secure area. When the user returns the badge uponexiting, the linked device can be wiped clean and then re-used again.

Consistent with the rest of this mobile software application, a userwith an approved virtual badge on his device or cell phone, may have thedevice's history mapped and tracked via the GPS based, mobileapplication for minutes, hours and/or days, subject to theAdministrator's setting. This method of tracking allows for yet anotherbusiness method of charging for the virtual badge's tracking duringusage by charging by the minute, just as cell phone usage is normallycharged. Related to this option and if selected by an administrator asan option, a guard at a check point could turn on the tracking of theuser's device via manual or electronic means at the check point for theperiod when the user is within the restricted area. If the user departsfrom the restricted area, the guard or Administrator may be alertedand/or the time, location, and the time at the location can be storedfor future retrieval. As part of proper exit protocol, i.e. when theindividual is no longer in the known restricted area, the guard oradministrator could deactivate the tracking software in the same mannerit was activated on entry. Using this option for a group of users withbadges within the restricted area thus allows, for example, for lawenforcement to examine all the users' track histories if there were aburglary within the restricted area to help establish which user mayhave been near the GPS location of the burglary at the time of theintrusion.

While the system can be designed to not let the virtual badge userdeactivate the virtual badge while in such a zone, the user mightdisable the virtual badge by simply turning off the phone or the phoneor device's battery might go dead. The system could note the time anddate of such a deactivation, and either alert an administrator, or logthe time, date, and last known coordinates of that virtual badge. Withconnectivity, the users could be live tracked on base maps or from asupervisor's smart phone with the application while the virtual badgeusers were within the restricted area. Even within areas where there arenot cell towers resulting in a completely disconnected environment, thedevice with the virtual badge could be tracked using the methodsdescribed in the rest of this software application and its earlierversions.

The present invention also involves a method that allows for the primaryfunctions of the core mobile and/or desktop software application to beeasily adapted for a multitude of uses, including but not limited to:social networking, business fleet-tracking/management, disasterresponse, post-disaster recovery, mitigation, preparedness, andinsurance claims. This technical process is accomplished by adding orsubtracting plugin-modules from the code base so as to develop FEMA'sWhole Community mentality for responding to disasters by users utilizingthe mobile application as a part of their normal daily routine. By usingthe GPS based cell phone application on a regular daily basis for fun orfor business, when an emergency occurs, all of the users are alreadyadept at using the application, rather than needing some new training orrefresher to recall how to use the application. The switch from normaldaily use to a use designed to immediately upload numerous SituationalAwareness reports from the Whole Community re-emphasizes the capacity ofusing non-governmental responders as force multipliers during adisaster. This collection of technical processes enables the same sourcecode to be customized to fit a multitude of needs. This plug-in moduledesign allows for maximum flexibility in adjusting designs to fit theWhole Community, whether for business, school, friends, family, church,or any other applicable group.

In any of the embodiments described herein, the system of identifyingindividuals using a virtual badge can further be adapted to includeindividuals who do not have access to an electronic display unit.Accordingly, users that have a virtual badge based on an electronicprofile electronically linked to and/or displayed on an electronicdisplay unit can be associated with a sub-group of individuals or usersthat do not have access to an electronic display unit. For thoseindividuals that do not have an electronic display unit, a virtual badgemay be created for each individual sub-group user and thenelectronically linked to an individual that has an electronic displayunit. The individual with access to the electronic display unit maytherefore contain multiple virtual badge displays, one for his/her ownprofile and one or more for the sub-group users. The following is anillustrative example of a method of identifying an individual using anelectronic identification system utilizing a virtual badge whichincludes users with and without access to an electronic display. Themethod includes the one or more of the following steps: establishing acustomizable set of data to be included in an electronic identificationsystem database for identifying one or more individuals from a usergroup using a virtual badge; identifying at least one individual thatrequires electronic identification using said virtual badge; providingan electronic profile for said individual; creating a virtual badgebased on said electronic profile; said virtual badge having information,images, indicia, or combinations thereof which identify said individual;providing each said individual access to said virtual badge; downloadingsaid user's virtual badge to a first electronic display device;providing a sub-group of users, said sub-group of users defined by oneor more users who do not have access to an electronic display device;creating an electronic profile for said at least one sub-group user;creating a virtual badge based on said electronic profile for each saidsub-group of user, and associating said sub-group user virtual badgewith at least one said individual requiring an electronic identificationusing said virtual badge. Additional features, steps or functionality asdescribed throughout the specification, such as but not limited to usinga second display unit, creating a map overlay, tracking the virtualbadge, may also form part of the method just described.

The virtual badge system, method, and device may also be adapted to useone or more biometric techniques and/or one or more biometric data toidentify virtual badge user individuals based on one or more uniquephysical characteristics or traits, including but not limited to eyespectrographs, fingerprint identification, facial recognition, retinaidentification, vein pattern recognition, signature recognition, orvoice recognition. The virtual badge system, method, and device may beadapted to include having the electronic display unit comprise thenecessary hardware and/or softer to capture data, such as images, aswell as process the information received. For example, the electronicdisplay unit described herein may include the necessary hardware tocapture or scan a fingerprint or retina. In addition to, oralternatively, the electronic display unit includes the necessarysoftware to process such information and/or electronically deliver suchinformation to an independent individual or administrator.Alternatively, as part of the data or images displayed as part of thevirtual badge, the electronic display device may include images of theuser's biometric data, such as a fingerprint, retina scan, voicepattern, in addition to the user's photo and address.

All patents and publications mentioned in this specification areindicative of the levels of those skilled in the art to which theinvention pertains. All patents and publications are herein incorporatedby reference to the same extent as if each individual publication wasspecifically and individually indicated to be incorporated by reference.

It is to be understood that while a certain form of the invention isillustrated, it is not to be limited to the specific form or arrangementherein described and shown. It will be apparent to those skilled in theart that various changes may be made without departing from the scope ofthe invention and the invention is not to be considered limited to whatis shown and described in the specification and any drawings/figuresincluded herein.

One skilled in the art will readily appreciate that the presentinvention is well adapted to carry out the objectives and obtain theends and advantages mentioned, as well as those inherent therein. Theembodiments, methods, procedures and techniques described herein arepresently representative of the preferred embodiments, are intended tobe exemplary and are not intended as limitations on the scope. Changestherein and other uses will occur to those skilled in the art which areencompassed within the spirit of the invention and are defined by thescope of the appended claims. Although the invention has been describedin connection with specific preferred embodiments, it should beunderstood that the invention as claimed should not be unduly limited tosuch specific embodiments. Indeed, various modifications of thedescribed modes for carrying out the invention which are obvious tothose skilled in the art are intended to be within the scope of thefollowing claims.

What is claimed is:
 1. A method of controlling access within an areausing an electronic identification system utilizing a virtual badgecomprising: providing an administrative entity for establishing acustomizable set of data to be included in an electronic identificationsystem database for identifying one or more individuals from a usergroup using a virtual badge; identifying at least one individual thatrequires electronic identification using said virtual badge; providingan electronic profile for said individual; creating a virtual badgewhich is displayable on a display device based on said electronicprofile; said virtual badge having information, images, indicia, orcombinations thereof which identify said individual; associating aself-destruct mechanism to said virtual badge to render said virtualbadge unusable after a prescribed time period or upon command from saidadministrative entity; said administrative entity providing each saidindividual access to said virtual badge; and transferring said virtualbadge from said administrative entity to a first electronic displaydevice.
 2. The method of controlling access within an area using anelectronic identification system utilizing a virtual badge according toclaim 1 further including the step of displaying said virtual badge on afirst display device.
 3. The method of controlling access within an areausing an electronic identification system utilizing a virtual badgeaccording to claim 2 further including the step of linking said virtualbadge image displayed on said first display device to a second displaydevice.
 4. The method of controlling access within an area using anelectronic identification system utilizing a virtual badge according toclaim 1 wherein said first electronic display unit is adapted for GPSpositioning functionality.
 5. The method of controlling access within anarea using an electronic identification system utilizing a virtual badgeaccording to claim 4 further including the step of mapping, tracking, orcombinations thereof, said virtual badge transferred to said firstdisplay device.
 6. The method of controlling access within an area usingan electronic identification system utilizing a virtual badge accordingto claim 4 wherein said virtual badge is tracked using RFID or NFC. 7.The method of controlling access within an area using an electronicidentification system utilizing a virtual badge according to claim 6wherein said location of said virtual badge is displayed on a map. 8.The method of controlling access within an area using an electronicidentification system utilizing a virtual badge according to claim 4further including the step of determining at least one location of saidvirtual badge; and storing said location within said first electronicdisplay device.
 9. The method of controlling access within an area usingan electronic identification system utilizing a virtual badge accordingto claim 8 wherein said data received by said first display device istransferred to at least one data storage device controlled by saidadministrator.
 10. The method of controlling access within an area usingan electronic identification system utilizing a virtual badge accordingto claim 1 wherein said virtual badge includes a photo of saidindividual, data, a pictorial image, text, optical machine readablerepresentations of data, or combinations thereof.
 11. The method ofcontrolling access within an area using an electronic identificationsystem utilizing a virtual badge according to claim 1 wherein saidaccess to said virtual badge is through a web based portal, a laptop, aserver, or combinations thereof.
 12. The method of controlling accesswithin an area using an electronic identification system utilizing avirtual badge according to claim 1 further including the step ofassociating a color stripe, a watermark, images, background, orcombinations thereof into said virtual badge.
 13. The method ofcontrolling access within an area using an electronic identificationsystem utilizing a virtual badge according to claim 12 wherein saidcolor stripe or background is programmed to change to a second colorafter a prescribed time period.
 14. The method of controlling accesswithin an area using an electronic identification system utilizing avirtual badge according to claim 1 further including the step ofdetermining a location of said virtual badge; and transmitting saidlocation to a display unit controlled by an administrator or user ofsaid system.
 15. The method of controlling access within an area usingan electronic identification system utilizing a virtual badge accordingto claim 1 wherein said virtual badge or said display unit is adapted touse at least one biometric technique, biometric data, or combinationsthereof.
 16. The method of controlling access within an area using anelectronic identification system utilizing a virtual badge according toclaim 1 further including the step of determining if said individual iseligible to use said virtual badge.
 17. The method of controlling accesswithin an area using an electronic identification system utilizing avirtual badge according to claim 16 wherein said determination stepincludes determining if said individual has been charged or convicted ofa crime, reviewing said user's financial history, or combinationsthereof.
 18. The method of controlling access within an area using anelectronic identification system utilizing a virtual badge according toclaim 1 further including the steps of: providing a sub-group of users,said sub-group of users defined by one or more users who do not haveaccess to an electronic display device; creating an electronic profilefor said one or more sub-group user; creating a virtual badge based onsaid electronic profile for each said sub-group of user, and associatingsaid sub-group user virtual badge with at least one said individualrequiring an electronic identification using said virtual badge.
 19. Themethod of controlling access within an area using an electronicidentification system utilizing a virtual badge according to claim 1wherein said virtual badge is adapted to include a clock in or clock outfunctionality.