[go: up one dir, main page]

CA2323153A1 - Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations - Google Patents

Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations Download PDF

Info

Publication number
CA2323153A1
CA2323153A1 CA002323153A CA2323153A CA2323153A1 CA 2323153 A1 CA2323153 A1 CA 2323153A1 CA 002323153 A CA002323153 A CA 002323153A CA 2323153 A CA2323153 A CA 2323153A CA 2323153 A1 CA2323153 A1 CA 2323153A1
Authority
CA
Canada
Prior art keywords
cndot
user
personal safety
briefcase
personal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002323153A
Other languages
French (fr)
Inventor
Steve Mann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002323153A priority Critical patent/CA2323153A1/en
Publication of CA2323153A1 publication Critical patent/CA2323153A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A portable device either interacts or can be credibly alleged to interact with an entity outside of the user's control. A method of doing business by providing ap-propriate services, middleware, and the like, for the device is also disclosed. The apparatus, in one embodiment, allows for the collegial identification of persons exert-ing physical or other coercive force, or the threat or possibility thereof, over the user of the invention. In another embodiment of the invention, submissiveness reciprocity is built into the apparatus or the business method, and the user of the envention can reduce his or her freewill or apparent freewill, to a level that matches that of a mem-ber of a large organization. The invention provides an incidentalist identificational or other similar procedure, so that legitimate officials are less offended by a person using the invention who might otherwise be perceived as disrespectful by demanding identification or other compliance from force or coercion bearing persons.

Description

~'.f !"'-_! ~ !_C~ 9 ! "~f =F''1PF!~T''~
~ ~~ ~,r ,~ :~ ~~~
~~~"Ptlt. i . r.'. , ..._.,..,. .. 'jyy Patent Application ~,.,.~"".~.~
of W. Steve G. 1~-Tam for BUSINESS METHOD AND APPARATUS FOR ENSURING THE
SAFETY AND PROTECTION OF PERSONAL OR INFORMATIC
PROPERTY OR FOR ENSURING PERSONAL SAFETY OR
RESPECT BY ARTICULABLY EXTERNAL SITUATIONS
of which the following is a specification:
FIELD OF THE INVENTION
The present invention pertains generally to a portable apparatus that provides the user with a means, apparatus, and method of dealing with strangers, criminals with a stolen security guard's uniform, criminals in positions of a,ttthority, or others who may apply physical force, coercion, or threats thereof.
BACKGROUND OF THE INVENTION
Children are often advised by their parents: "Don't, talk to strangers!" .
However, many times individuals may be stopped cm the street and asked for identification by a person who is, for all practical purposes, a stranger. For example, there is always the possibility that the trusted uniformed SS man on the street who demands "Your papers please!" may in fact be a criminal, perhaps even wearing a, stolen uniform and carrying fake or stolen badges and identification.
In today's society which is teeming with dangerous criminals, buildings often have sophisticated access control to make sure that everyone entering the establishment is properly processed, but those wearing uniforms; such as the officials operating these establishments, ma,y often escape a mea,us of being similarly held accountable for their actions.
Moreover, building owners have devc;lo ped means and apparatus for containment, confinement, and other forms of processing they wish to apply to individuals passing through their establishments.

U.S. Pat. No. 4341165 describes a revolving door which allows the building owner to entrap and detain persons it might wish to detain. U.S. Pat. No.

describes a similar invention that also anah-~zes the individual so entrapped.
U.S. Pat.
No. 4461221 describes a system for detaining robbers on premises. U.S. Pat.
No.
4341165 also describes a simila,i system. L~.S. Pat. No. 5311166 describes a system for directing water and chemical weapons on xtndesirable persons entering a premises.
U.S. Pat. No. 5528220 describes a, device that automatically sprays chemical weapons on individuals entering an a.rca where the owners of the establishment would prefer that individuals not enter.
Other forms of access control, such as card readers, etc.; are well known aspects of the prior art. The field of biometrics is also well established, through a number of scholarly conferences airxzed ai: producing a utopian future in which certain select individuals can know the whereabouts of most other individuals at all times.
In addition to access control, there are also perimeter security devices such as that disclosed in U.S. Pat. No. 5182764 to scan individuals for weapons, an d other forms of devices that allow oflicia.ls or security gzxards to see through clothing to inspect individuals. Some systems allow officials to secretly search individuals without their knowledge or consent, and without ayy kind of due process.
U.S. Pat. No. 4796311 describes an intake facility whereby individuals may be required to undress completely, while being viewed by facility owners or the like, who can also n xonitor and control a decontamination process. U.S. Pat. No.
4858256 and U.S. Pat. No. 5551102 describe similar ''clecon'' systems, whereby an individual may he prevented from passing from onf~ secaion to another unless the individual complies with orders or requirements of those in <:ontrol.
Historically, showers with airtight-I--watertight locking doors that cannot be opened by the occupants have been used to subject the occupants to various chemical sub-stances. Such practices and procedures are well known in the prior art.
Moreover, the general concept of ensuring that in dividuals have their papers in order. is also a well known aspect of the prior ant.
Business models, and methods of pro<:essing individuals passing through official spaces, buildings, offices, prisons, a,nd thc, like, are well known in the art of record.
However, the art of record for the protc;ction of the individual person, personhood, and personal space, is somewhat lacking. Although physical protection of the body through armour is a centuries-old aspect of the prior--art, dating back to the days when five to seven layers of rhinoceros skin were Z.tsed to protect the body during battle. sl.ich physical protection of the body has not kept pace with informatic devel-opments in protection of property as we evolve from a physical world to an inforrnatic world.
Although protection of property has evolved from medieval fortresses toward bank towers with glass doors protected by card readers and retinal scanners, the protection of the body has not kept pace with the move from physical stone fortresses to more the informatic protection of buildings.
Little has been done to address the protection of individual Humanistic Property in a world so obsessed with the protection of Intellectual Property a,t the expense of Humanistic Property. In keeping buildings secure from "theft'', a new kind of theft has emerged as a side--effect of the security systems themselves. This theft of Humanistic Property is addressed some short articles such as one entitled Theory of Darkness, published on the nor ning of April 1. 1995, on the World Wide Web, at URL http://wearcam.org/theory_of_darkness.html.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention will now be described in more detail, by way of examples which in no way are meant to limit the scope of the invention, but, rather, these examples will serve to illustrate the invention with reference to the accompanying drawings, in which:
FIG. la illustrates an individual interacting with a clerk who either is, or pretends to be, under the control of a manager who either is, or pretends to be under the control of a chief technology officer, who either is; or pretends to be, under the control of a board of directors, etc..
FIG. lb illustrates an individual who either is; or pretends to be, under the control of a Safety lVlanagememt Organization (SMO).
FIG. lc illustrates a collaborational submissivity symmetrizer.
FIG. ld illustrates an obfuscator.
FIG. le illustrates a wallet in which an individual may carry his or her identifica-tion, such that his or her papers are in order, within the wallet, yet designed so that he or she cannot open it himself/herself without tlxe hind help of an official such as an SS man with proper identification.
FIG. 2 illustrates an alternative of the' safety wallet which requires a valid finger-print scan of a finger other than the owner's in order for it to open up and reveal the owner's papers in order.
FIG. 3 illustrates an embodiment of the safety wallet with a. drug tester, such that drug user's do not have access to the owner's papers.
FIG. ~1 illustrates another embodiment of the safety wallet which has a DNA
sampler and only opens when a DNA sample is inserted, at which time of opening it also automatically takes a picture or begins recording video documentary for posterity of the beautiful state of affairs that happens when an official sees that one has his or her papers in order.
FIG. 5 shows an embodimerxt of the invention Quilt into a wristwatch which sim-ilarly captures video and is also equipped with a fingerprint scanner.
FIG. G shows another wearable ernbodimexxt of the invention, where special eye-glasses assist the wearer in avoiding the temptation to talk to strangers who have not yet slid a, government issued ID card throx-tgh the slot on the wearer's head.
FIG. 7 shows an embodiment of the invention comprising a palm reader which is unlocked by the sound of a fire alarm.
FIG. 8 shows a personal safety device in the form of a denializer with forgettable mode.
FIG. 9 shows a personal safety device in the form of a fingerprint scanning briefcase lock.
FIG. 10 shows a Point of Purchase terminal for dispensing payment subject to certain conditions.
FIG. 11 shows a liabilizer aspect of the invention.
FIG. 12 depicts an alternate version of tlne liabilizer, in the form of a Personal Safety Device (PSD) aspect of the invention which prevents theft of the appara-tus. and discourages torture or other lxmnan rights violations against the wearer, in the same way that inlc-loaded anti-theft tags protect clothing from being stolen by shoplifters.
FIG. 13 depicts an embodiment of the invention in which a visible deterrent exists in the form of an image of an official or clerk is projected on the floor in front of the individual's feet as the individual is walking forward.
FIG. 14 depicts a Polymer Dispersed Licfuid Crystal (PDLC), or Polymer Stabi-lined Liquid Crystal (PSLC) secure press-per-view system.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
While the invention shall now he described with reference to the preferred em-bodiments shown in the drawings, it slxould be l.tnderstood that the description is not to limit the invention only to the particular embodiments shown hut rather to cover all alterations, modifications and e<tuivalu~nt arrangements possible within the scope of the appended claims.
In all aspects of the present invention, references to "camera'' mean any device or collection of devices capable of simultaneously determining a quantity of light arriving from a plxzrality of directions and or a,t a. plurality of locations, or determining some other attribute of light arriving from a plurality of directions and or at a plurality of locations. Similarly references to vidcntifier" shall include devices such as face recognizes camera vision systems, fingerprint scanners, and the like, as well as devices that capture a. sample of data for later identification, such as devices that collect a DIVA sample.
References to "processor" , or ''computer'' shall include sequential instruction, par-allel instruction, and special purpose architectures such as digital signal processing hardware, Field Programmable Gate Arrays (FPGAs), progrannmable logic devices, as well as analog signal processing devices.
References to ''obfuscatox~" , ''obfuscation increases" ; or "obfuscation articulator"
shall refer to devices, processors, processes, methods, or the like, that make the locus of control of the apparatus of the invention less visible or less discernible to persons other than the users) of the apparatus anal method of the invention. For example, a container for personal effects may have a forgettable mode in which the user can cred-ibly forget, or allege to have forgotten, how to open the container. This forgettable mode may be made less discernible by way of complicated or seemingly complicated protocols that are either beyond the control of tlxe user(s), or for which the users) can credibly allege are beyond his, her, or their control. A deniable mode of operation may also exist, in 'which the users) can deny or be credibly unsure of cause and effect, relationships with regards to compliance with orders, demands, or the like placed with physical force, threat, coercion, detainment. or the like. A wdeniability articulator" is that which makes deniability, or alleged deniability articulable by the user, to those requiring, demanding, or suggesting certain actions be taken or not taken by the user.
Deniable modes can thus also be made less visible or less discernible to persons other than the users) of the apparatus, by way of obfuscators. An "obfuscation articula tor" refers in particular to that which makes such obfuscation more a.rticulable. For example, a remote escrow service may provide an articulable basis upon which to deny knowing or remembering a, decryption key or password, and thus not be held in content of court for failing to disclose same.
References to user shall include a group of users, associates, or the like;
such as a husband and wife traveling together, carrying luggage equipped with the apparatus of the invention, so that both may crc>ate, have created, alk;ge to have created, situations that are jointly beyond their control, in being cozzsidered as a '' user" of the apparatus or method of the invention. References to "user" znay include a. collective of users, a community of users, or the extended space of one or more users in collaboration, possibly with remote entities partially or wholly beyond user control.
References to "liabilizer'' , to "liability increaser" , or to vliability articulator'' shall include apparatus, devices, processors, processes, methods, or the like, that make those requiring certain behaviour of a user to assume some additional or increased liability that may arise from the user carrying out, their request, order, requirement, or preference. For example, clothing or other personal effects may be equipped with medical monitoring equipment, so that its removal could either adversely affect the medical monitoring, or be alleged to a,dvE:rsely affect another processes, whether real;
imagined, or alleged by the user. Thus, for example, a person or persons requiring or requesting the removal of the clothing or other personal effects could be held, or be alleged (by the user of the apparatus or method of the invention) to be accountable or liable for a disruption in the measurement space of a medical monitoring system, and therefore liable, for example, for possible undetected heart problems that were undetected (and thus untreated) because of a disruption in the measurement space.
A "liabilizer" may, for example, be an apparatus, system, or the like, that rnay have been installed. or may by credibly alleged (by the user) to have been installed in a manner that would be difficult to re-install (e.g. clothing that the user can allege to be unable to reposition correctly for corrcect medical monitoring;
or the like). A ''liabilizer" may; for example, include forms to be completed or signed by a person requesting, demanding, or suggesting certain behaviour of the user, where certain legal liability is assumed. A ''liabilizer" ma,y also include video capture by the user of a request, demand, or suggestion, made to the user. A "liabilizer"
can also include a requirement of certain operating parameters, such as the continued operation of a pacemaker and an associated wearable computer transmitting and receiving signals to it, or of a, personal safety device with radio connection that must be maintained in order to reduce danger, or increase safety. Therefore, for example;
a person requesting, demanding, or suggesting that the user ride in an elevator could be held to an increased liability for loss of communications signal, and may therefore be collegially required by the user to provide access to a stairway, even though the user of the method or apparatus of the invention would not otherwise have any power of influence over a forceful, or authoritarian official or organization. A
"liabilizer'' may also include a recognizer, the recognizer being a. means of collecting identifying characteristics of a person presenting a demand, threat, request, or the like, to the user of the apparatus or method.
References to ''freetime corporatizer'' shall include apparatus, devices, processors, processes, methods, or the like, that assist the user of the method or apparatus of the invention to present an articulable basis upon which to be bound, in regard to the user's free time, by corporate policy or similar externalities beyond, or credibly articulably beyond; the user's control. A freetime corporatizer, for example, may be an object, obligation, task, errand; duty, or ware; assigned to an individual in order to convert his or her freetime into Gorporatized time. Corporatized time is time that belongs, at least partially, to a Corporation or other externality beyond.
or credibly articulably beyond; the user's control. For example, in one embodiment of a freetime corpora,tizer; the user may be given a small token package to carry, a token errand to run, confidential information, confidential documents, allegedly confidential information, or allegedly confidential documents. or the like, and may therefore accept these materials in order to be bound to a freedom of external locus of control. For exan xple, prior to travel, a user can requost, from a corporatized time service provider, a small package to carry and thus inxplicitly request to be bound to protect it. Thus the user could assert in indifference to being refused travel or lodging, e.g. an indifference to the possibility that lxe or she might die on the streets, but the user can make an articulable basis that he or she nnxst protect company property.
and therefore liabilize (hold n xore liable) a hotel owner or airline for my failure to board or provide lodging, to the user, or the like. Alternatively, a user may request a, secret or allegedly confidential document, and thus, implicitly or explicitly request to be bound to protect it. An investigative photojournalist might, for example, request confidential documents and request to hoe required (by th a provider of the means and apparatus of the invention) to photc>gra,ph any situation that might constitute evidence of theft of the intellectual property contained therein. Thus, for example, the user can request to be hired (possibly for a small negligible token fee) to run an errand during the user's free time, and thus be bound to a Corporate Policy of the user's implicit choice. As another example, the user may apply for ayy of a variety of special corporate credit cards that each reduire the user to follow certain requirements, such as a special credit card that requires (by way of its cardholder agreement) that the user photograph anyone who comes in contact with this company credit card.
Thus the user may, for example. seleca from u. menu of choices of various documents or other material, each having an associated requirement. Thus the user can select from a table, or other database, which policy lxe or she would like to be bound by, and then find a small job or errand that requires the user be bound by the policy that the user wishes to be bound by.
A user of the means or apparatus of the invention is said to be "bound to free-dom" when the user is required to carry out the user's own desire or preferences;
which might, for example, include hoeing bound by a submissivity symmetrizer.
A
submissivity symmetrizer is arx apparatus, device; processor, process, methods, or the like; that requires the user to impose specific requirents on those who impose re-quirents on the user. For example, a sulnnissivity synnnetrizer may be an apparatus;
device, processor, process, mctlxods, or the like, that, requires the user to obtain valid identification from an official who asks the user for identification. The user may be bound to the freedom of this synnnetry, 1>y way of being legally bound to freedom. or c) being actually physically bound to freedom (e.g. being unable to show identification by way of a. wallet container that the user cannot open without receiving identifica-tion from the person asking to open it). r1 user may be legally bound to freedom, or allegedly bound to freedom (as when for example the user could open the wallet but pretends to be unable to do so until an official asking it be opened slide identification through a card reading slot on the wallet). A user may also be physically bound to freedom, for example, by way of a,n elect.rical corrective signal that causes the user to experience pain when confined away from connectivity (e.g. electrical corrective signal applied in response to data packet loss). Alternatively, a, user may be infor-matically bound to freedom by way of a, denializer, liabilizer, or the like. A
means, apparatus, dei-ice, processor, process, method, or the like, which causes a user to be "bound to freedom" will be referred to as a ''freedom binder" .
A corrective signal may include, as one possible example, an electrical corrective signal, such as a,n electric; shock administered to the user of a personal safety device, in at least one mode of operation. The corrective signal may be articulable, in the sense of it being difficult for others to ascertain whether or not the apparatus is actually operating in that one mode of operation. Alternatively, am articulably corrective signal can comprise a mode of operation iu which the severity or actuality of the corrective signal, is difficult for others to ascertain, wherein therefore others can be held, or imagined to be held, liable for the corrective signal, whether actual, percieved, or imagined by a user of the personal safety device. To make this corrective signal more articulable, it rnay be synchronized with an externally percievable stimulus that can be observed by others, such as actual muscle contraction of the user, or a loud snapping noise of an electrical spark, or the like, where the actual severity of the electrical signal may be drastically reduced from the severity apparent to persons other than the user.
When it is said that a. person can validly open a lock, this means that the lock can be opened without excessive force, circumvention, or traverse of its intended manner of being opened.
A communications distance is a distance as measured by reception of a communica-tions medium such as a string, cord, or wire that may become severed or unplugged in excess of the communications distance. or a radio signal that may fall below a certain threshold or for a certain time when the device is taken beyond the communications distance.
When it is said that object ''A'' is ''borne'' by object "B'', this shall include the possibilities that A is attached to B; that .4 is bonded onto the surface of B; that A is imbedded inside B, that A is part of B. that A is built into B, or that A
is B. An example of "A is B'' might be a camera-bearing pair of eyeglasses, in which the eyeglasses themselves are a camera, in the sense that there is a CCD
sensor array sornewherc in the eyeglasses, a hem somev~~here in the eyeglasses, and a cavity between the two that is part of the eyeglasses, and has no clearly separable portion that could be regarded as a separate entity.
FIG. 1e is a diagram depicting an individual 101A versus a clerk 102A. The clerk is bound by, or pretends to be bound by. conditions from a manager 103A.
The manager 103A is bound by, or pretends to be bound by conditions from a chief technology officer (CEO) 104A. The CEO 104A is bound by, or pretends to be bound by a board of directors 105A.
A typical example of such a situation is when a person tries to negotiate with a used car salesman, and the used car salesman might say something like ''I'd love to give you the car for X1000; let me check with my manager" . The used car salesman then disappears into a back room, has a coffee, and reads a, newspaper for a few minutes, and then comes out and says "I'd love to give you the car for X1000 by my manager won't let me." . Although the salesman never talked to a manager, the salesman has some degree of power over the <:ustomer by virtue of being able to credibly pretend that he is bound by a. higher authority. A credible.
articulable, higher and un ciuestionable authority allo« s representatives of organizations to obtain external blame and excuses for their otherwise irrational or disagreeable actions.
Unfortunately the individual person does not ordinarily enjoy the same luxury as the clerk, and must therefore behave more rationally, or risk seeming irrational.
Religion can form a similar purpose for the individual, but there is the danger that others (including clerks) may dismiss the individual as a religious freak.
Therefore, what is needed is a similar wa,v for the invidic_lual to have excuses for and to externalize blame for otherwise irrational or disagree able actions.
FIG. 1b shows an embodiment of the invention in which individual lOlA has a credible mechanism to externalize at least a portion of his or her actions to a Safety Management Organization (SI~TO) 1028. rhhe~ S1~I0 102B provides an articulable basis upon which to deny free will or self deterruinatiou. The SWO creates a management system, either real or percieved by others, that forces clerk 102A out of the normal role; making necessary a true back channel 111B from clerk 102A to manager 103A, which will often also require a true back channel to CEO 104A, etc..
Ordinarily there would be no such hack channel. or the back channel would be reduced. For example, if individual 101A complains about video surveillance systems in use by clerk 102A; then clerk 102A will simply refer individual lOlA to manage-ment, and management will be likely only available on certain limited hours, and after waiting extensively and being held up a,ucl delayed in line extensively. Then manage-ment will likely say the directive for use of surveillance comes from head office, and refer individual lOlA to head office, where individual lOlA will spend several horns waiting on hold and calling varioms telephone numbers, etc.. Head office will then say that the surveillance is used because the insurance company requires it.
However, if the individual 101A takes oust his or her own personal camera and photographs the clerk 102A, indicating that the SI~TO 102B requires it, a very fast back channel 111B will arise. Immediately the manager 103A will suddenly become available, and the individual lOlA will no longer have to wait in line or come back on a certain special day to talk to the manager. The matter will rapidly escalate to the highest level of authority.
This system has a symmetrizing effeca in which the individual and manager either snap out of their respective roles. or a hack channel is forced, disrupting the normally one-way nature of the control flow from the top-down of management to clerk 102A.
In addition to an Sl~~TO 102B; the individual 101A can also choose to be bound by (or to pretend to be bound by) an Sl~MO 102B that is itself bound by a higher authority such as an insurance company. Thus, in one embodiment, the individual lOlA could, for example, take out a life insurance policy that required him to wear a personal safety device that recorded video at all times.
Thus an individual wishing to wear a video capture and recording system merely signs up with a life insurance company that requires him to do so. A small premium of one cent per year could be paid by the individual lOlA primarily for the reason of being bound by the requirement to wear the device. For example, the life insurance company could provide the individual 101A with a choice of two programs; one being one cent a year wearing a camera, and the other being two cents a year not wearing the camera. Thus the individual wishing to wear a camera system simply selects the lower premium, and then blames his apparently irrational actions (like constantly wearing a camera system) on the insurance company.
Thus the life insurance company has provided the individual with a means for articulabh> extern aizing his own irrational actions. low the individual can say "I'm wearing this camera because my manager (Sl~MO) requires it, and the insrance com-pany requires the S1VT0 to require me to wear it, etc.. This reverse chain of command is denoted by amplifier 1048.
Preferably amplifier 1048 is shielded l-~y shield 1058, making it difficult for clerk 102A to trace the chain of command backwards, upstream through the amplifier the wrong way frc»n its output 1038. Thus input 1098 to the amplifier 1048 can be unaffected by any action taken by clerk 102A even at output 1038.
l~~Ioreover, a secret input 1088 to the annplifier may actually originate by individual lOlA. In this sense, individual lOlA is actually bound by his own wishes, but a shielding conduit 1068 keeps this fact secret from clerk 102A. Additionally, a shielding 1018 may surround all or part of individual lOlA. Thus the SV10 rnay actually be directed by the individual 101A to bind the individual lOlA to certain terms and conditions. This shielding may be physical (such a,s by way of a shielded body worn computer system with an encrypted wireless link to and from the S~IO 1028 and the amplifier 1048), or it may be embodied as part of the business model and method of doing business in personal safety. In the case of the physical system; the binding may be legal or actual, in the sense that individual lOlA receives an electrical corrective signal (e.g. electric shock) for not complying with the reduirements of the S~IO
directed by amplifier 1048. An example of such a system might include a system or method of doing business for an individual wishing to have a right to connectivity to communications infrastructure. The individual could choose to receive a shock for each packet of data lost. Therefore a, clerk or of~cia,l 102A trying to force the individual lOlA into a room or space with poor wireless connectivity would thus be giving the individual lOlA painful electric shocks. In this way, a clerk or official trying to force the individual lOlA into a basement elevator, holding room; or the like, would be committing an act of torture. In this embodiment; the system might provide individual lOlA with the right to have other persons at remote sites monitor how he is being treated.
In the same way that a motorist refusing to take a breathalyzer test is considered to be a drank driver, an official denying an individual the right to be monitored by an external and independent safety organization should be considered to be trying to treat the individual poorly, and should be considered to he trying to hide this maltreatement from the external SMO 102F3.
FIG. lc is a diagram depicting a. colla borational submissivity symmetrizer.
An individual lOlA might be requested by a c°lerk 102A to submit to some kind of action, such as a search of personal effects. or perhaps individual lOIA might be asked by clerk 102A to show some indentifica,tion or papers or the like. Ordinarily, an individual lOlA travelling on free time (pleasure rather than business) may be asked to submit to a search, or asked to do other things. If individual lOlA refuses, then individual lOlA
could be held in contempt of some official policy. contempt of court, or the like, and possibly imprisoned. However, for certain requests, an embodiment of the invention prevents the individual 101A from complying with the request of clerk 102A.
For example, a personal corporatizer lOlC may encapsulate the invididual's free will in the corporate container provided loy the personal corporatizer lOlC.
The per-sonal corporatizer lOlC thus binds the individual to freedom, by preventing the in-dividual from straying from freedom, so that it is not by free will that the individual lOlA chooses freedom, bttt, rather, by corporate policy forced upon the individual by personal corporatizer lOlC.
The personal corporatizer 101C contains a personal space 1000 that individual lOlA can deny, by deniable link 1090, an ability to control at least some functions of personal space 100C. Personal space 100C could, for example, be a container that individual lOlA can articula,bly deny being able to open. Alternatively, it could be a file that the individual lOlA can articulably deny being able to decrypt. An additional feature of this embodiment is an actual or articula,ble, perceived by others possibility to control at least some of the functions of personal space 100C that the individual lOlA either actually cannot control, or articulates being unable to control.
The embodiment therefore includes a submission interface 1030 through which individual lOlA invites clerk 102A to assist individual lOlA in carrying out the request of clerk 102A.
In this way, the individual lOlA involves the clerk 102A so that the two work together to fulfill the request of clerk 102A, rather than having the individual simply comply with the request or demands of clerk 102A.
The submission interface 103C maw inch zde an identifier or biometric device that identifies characteristics of clerk 102A, or other elements of submissiveness for clerk 102A to engage in; so that a side: effect of clerk 102A demanding compliance from individual lOlA is that both parties end up being in some way in submissive roles.
Thus the invention disrupts a master slave relationship that might otherwise exist with individual lOlA being an obedient slave to clerk 102A.
The sumission interface allows individual lOlA and clerk 102A to both input to a collaborator 104C. The collaborator 1()4C also either takes input from the Sl~IO
102B or articulably has the possibility of taking input from S>\10 102B. This adds a, further layer of articulable deniability in which individual lOlA is not necessarily seen is disrespecting clerk 102A. An articulably amhiguotts ability to affect certain aspects of personal space 1000 thus arises.
FIG. 1d depicts an obfuscator suitable for allowing individual lOlA to interact with a remote point of interaction. A remote point of interaction may be a device such as au automated teller machine (AT1~I), a remote border crossing, or other sys-tem where the interaction is by way of a remote entity that places requirements or demands on individual lOlA. Ordina,rilv individual lOlA faces a remote terminal 102D that is unforgiving and unbending from a programmed set of rules. The unfor-giving and unbending nature is depicted as outputs of amplificational devices depicted in the diagrams of lOlD. The individual, however, with similar remote equipment, 100D, interacts through an obfuscator lOlD that makes the input to amplifier indiscernable to the perpetrators of terminal 102D. The obfuscator lOlD may also drive an A\ D function 104D that requiros Borne external input from an SMO or the like.
FIG. le is a diagram depicting a safety wallet used to keep passports, identifi-cation. or other papers in order, as might be required by organizations that like to 1 r~

screen for or keep out undesirables. An antenna 100 keeps the wallet on the Internet or the like, and a hinge 110 allows it to open up but only after an identification of the person wishing to see the user's papers ha,s occurred over the radio link provided by antenna 100. A tether (chain, cable, or the like) 120 keeps the wallet attached to the user's body. Preferably tether 120 is such that it can be tlweaded around the user's waist and then fed into the open wallet, such that access to the end is needed to detach the tether from the user, and access to the end requires opening the wallet.
Alternatively, a special strap around the waist or ankle may be held in place by a cable similar to those used to lockdown conxlnxters, which then is inserted into the wallet prior to closing it.
Alternatively, the tether may be wireless, such that a person stealing the wallet, will be subdued or marked with chen xical means; such as that manufactured under the trade name Dye Witness (TM). A thief taking the wallet beyond reach of a corresponding wearable radio transmitter will simply cause the device to switch into a protective mode of spraying with chemicals. Similarly. attempts to force open or bypass the lock on the wallet will result in similar discharge of chemical disincentives.
To open the wallet, an official must slide a, government issued ID card through slot 130 in card reader 140, as indicated by signage 150 upon wallet housing 160. If the ID card is valid, and is found by way of antenna 100 to not have been reported as stolen, then the locking mechanism of wallet housing 160 is released so that the official can see that the wallet owner's papers are in order.
FIG. 2 depicts a version of the wallet embodinxent of the invention that uses a fingerprint scanner instead of a card reader. The instructions simply direct the official wishing to see the owner's papers to press on a certain portion of the wallet to open it. This portion of the wallet is really a miniature fingerprint scanner similar to those used in the Biol~~Touse (TM) computer fingerprint scanner.
The wallet checks to make sure the scanned fingerprint is a valid fingerprint a,n d is not that of the owner, prior to releasing the mechanism that allows the wallet to open. The device. allows the owner to put it in a mode of operation in which the owner cannot open it. without, assistance from a remote SMO. The remote Sl~'TO
may refuse to open the owner's wallet until the official has transmitted a valid set of fingerprints to the remote SMO office E~or comparison against a database of known criminals. Subsequently the Sl~'IO may allow the owner to open his own wallet by sending the owner a security access code that the owner either did not know, or may convincingly have forgotten.
FIG. 3 shows an embodiment of the wallet that cannot be opened by drug users such as drug-using criminals wearing SS uniforms. In order to open the wallet, it is necessary that someone other than a member of the urIDent (TM) wallet owner's collective urinate into the urine tester 3()0. Urine tester 300 verifies the drug-free aspect of the individual asking to see the owner's papers. In this case wallet housing 160 may be opened after cleaning off excess urine. Wallet housing 160 is equipped with a seal, to keep the papers inside from getting soaked in urine.
FIG. 4 depicts a safety wallet with DNA sampler. Officials carrying stolen iden-tification would no doubt be terrified of this wallet, because of DNA sampler 400.
However, law-abiding non-corrupt officials have nothing to fear, and simply insert a DNA sample, causing wallet housing 160 to be unlocked so they can open it.
i~Tuch to their pleasant surprise, they will get photographed with camera 410 when the wallet opens. Flashlamp 420 makes certain the precious moment is captured in the best colour rendition possible. Camera 410 transmits images over antenna 100 to a plu-rality of remote locations in various countries around the world, so that a dishonest official will have a hard time destroying all of these images, and therefore runs a higher risk of getting caught.
Honest officials will no doubt enjoy being photographed. It is most certainly only the dishonest or corrupt officials who fear accountability. Thus it may suffice to have only the flashlamp 420 without the camera, so as to scare away criminals. In fact in many of these embodiments, a large number of fake units that look like the real ones, with only a few real units, would suffice to frighten corrupt officials, forcing them to remain on their best behaviour at all times since they never know whether or not they are being remotely monitored or the like.
FIG. 5 depicts a,n embodiment of the; invention built into a wristwatch 500.
Cam-era 510 may be aimed by the wearer who is looking at screen 520, such that camera 510 can be used to take a high quality picaure or video of an official standing behind a counter or the like. Wristwatch 500 may be aimed by setting the wrist upon a counter in a natural fashion, so that a picture of an official may be taken without the knowledge of the official.
In present embodiments of the invention. a cable 560 is connected to a wearable computer 570. Wearable computer 570 comprises battery pack 572, computer cpu 574, and communications system 576 which transmits pictures by way of antenna 578. Preferably images are transmitted by FTP (file transfer protocol) to special incoming-only accounts so that the user of the wristwatch cannot delete them (and therefore cannot be forced against his or her will to delete tlm; pictures).
should the official discover pictures have been taken.
The official may discover that one or more pictures have been taken, or the invidual may actually inform the official that a picture was taken for quality control or training purposes or the like. A method of doing business in personal safety includes a Request for Deletion (R.fD) that can be provided to the clerk or official 102A by the individual lOlA. An example RfD appears below:
Form-698 --- Request For Deletion (RFD) The Request For Deletion (RFD) form comprises a single sheet of paper, two sides.
REQUEST FOR DELETION
(RFD) In the interest of employee safety, our employees are required to wear uniforms equipped with protective media to discourage others from exposing them to dangerous situations or environments (e. g.
establishments where fire exits are chained shut illegally or the like), or to falsely accuse our employees of crimes (such as shoplifting and the like).
Our employee uniforms capture images, photometric measurements, and or other measurement information and the like, which may have been and may continue to be transmitted and recorded at remote locations.
Furthermore, our employees are required to document, via more traditional photographic means, any incident in which there is a perceived or suspected safety hazard, or any incident in which there might be potential for a crime to be committed in the future (such as when an employee presents a company credit card, when an employee makes a purchase but is not given a receipt that provides proof of the purchase such that a false shoplifting accusation could be forthcoming, or when cash is being handled by one of our employees).
For YOUR protection, our employees are also required to photograph each person they interact with, as well as maintain a recording of the conversation, in order to pre-empt any disputes regarding return of merchandise.
If you feel that one of our employees has documented something within your establishment that you do not wish to remain on file in our image archives, or if you feel that your likeness should not remain on file in our archives you may submit a REQUEST FOR DELETION (RFD) to our employee who will forward it to our Company Headquarters.
Your RFD, if properly completed in full, will be presented to a committee, and a decision will be made as to whether to expunge said images) or to flag said images as noteworthy (e.g. by submitting an RFD, you should be aware that it may in fact cause your likeness to be flagged as suspicious or of special interest to the permanent archives).
Part I: Declaration of reason for RFD (please circle only one):
A National security:
You must be a government establishment or have government affiliation (such as government funding) to select this option.
B Company confidential:
1~

B1: A trade secret has been inadvertently documented by our employee.
B2: Strategic marketing plans have been inadvertently documented by our employee.
B3: Other company confidential ____________________________________ (please describe, use additional page if necessary) C other _______________ (please describe, use additional page if necessary) Part II: Declaration of abstinence from willful destruction of evidence of a criminal act.
In recognition of the fact that measurement (photometric, radar, or otherwise) data captured by our employee may comprise evidence, in the context of a possible future criminal investigation against me or my establishment, I, the undersigned, declare that my REQUEST FOR
DELETION is not for purposes of concealing criminal activity of myself or of others in my establishment.
I assert that my RFD is not intended to hide criminal activity of any kind occurring within my establishment, including, but not limited to fire exits chained or otherwise fastened shut illegally, or criminal activity of myself. I further assert that my RFD is not for purposes of concealing or destroying evidence of harassment of a representative of Personal Safety Devices (PSD), or to conceal discrimination against a PSD employee.
Name: ______________________________ Social Security Number: _____________________________ Signature: _________________-_______ Right Thumb: +---------------+
+_______________+
(PSD employee to assist in centering thumb print in box) A NOTE ON PUBLIC SAFETY:
You should understand that public safety (including that of our employees) is for YOUR benefit. For example, by eliminating credit card fraud, the credit card companies are able to continue to charge lower profit margins, which increases your store profits. As you are well aware, your use of surveillance cameras has reduced costs and benefits the customer (e. g. you often use the words "for YOUR
protection you are being videotaped"). We appreciate your concern for your customers (us), and wish to return the gift of public safety to your establishment, in a manner in which we can all benefit, through the creation of a utopian world order of zero crime.
_____________________________for PSD use only___________________________ Image index and type (e. g. v000100.jpg to v000199.jpg, or v123.pic), to be completed by PSD employee prior to submission to Company Headquarters __________.JPg to __________.jpg ______.pic ______.mpg ______.dat __________..JPg to __________..JPg ______.pi~ ______.mpg ______.dat __________.jpg to __________..JPg ______.pic ______.mpg ______.dat (use additional page if necessary) In future embodiments of the invention. all components may be built direca,lv inside wristwatch 500 rather than using a separate wearable computer.
Wristwatch 500 contains a second camera 550 which will take a picture of an official who asks to see the wearer's wristwatch. The wristwatch is also equipped with a fingerprint scanner 200 which the individual lOlA wearer can ask an official or clerk 102A to press in order to view the individual lOlA's online electronic identification.
In this way the individual lOlA user can scan his or her papers; and have them very much in order on a WWW page which may be viewed by honest officials and clerks 102A when they press scanner 200 in screen 520.
FIG. G shows a headworn embodiment of the invention. A wearable magnetic stripe reader G10 is quite similar to the card reader 140. It allows officials to iden-tify themselves to the wearer of the apparatus, as well as to others on the internee.
Data connnunications antenna G20 facilitates a reliable low speed bidirectional data connection, while transmitting antenna G00 facilitates a faster (although less reliable) connection. which is completed by receive antenna 630. When an official or clerk 102A identifies himself by way of card reader 610; the visual filter operating either in a body worn computer, or on a remote supercomputer is adjusted so that the individual lOlA (wearer) can see the official. Otherwise the official is filtered out of view. The wearer's only perception of th<~ world is upon a virtual reality headset G50 which is completely imrnersive, such that. the wearer cannot see anything unless the computer feeds this visual signal to the wearer. Thus camera G40, which feeds into the computer, the output of which feeds into virtual reality headset G50, provides ~.
visual filter. This visual filter provides the wearer with eye protection. In this way strangers can be filtered out of the wearer's field of view.
Similarly sound blocking earnmffs GGO, with transducers inside, provide ear pro-tection. The wearer hears through the computer; which in turn accepts input from microphones mounted on the headgear.
Preferably the apparatus also includes loudspeakers that announce various options to officials who might encounter the wearer of the apparatus. Some options such as those described in http://www.wearcam.org/pleasewait.html, include:
~ If you would like to try to sell me a new product. press 1.
. If you would like to ask me to fill ont a form, press 2.
~ If you would like to show me an advertisement, press 3, and slide your credit card through yy slot to purchase my attention.
~ For quality-control and training purposes, this conversation may be recorded or monitored.
~ If you would like to inform me that photography is not permitted on your premises, fill out a form G98, press J, and wait for my next available moment.
These options correspond to selections that the official can make by pressing keys on face-mounted keypad G70.
Option 3, in particular, arises because the visual filter comprised of camera G40, virtual reality headset G50, axed computational processing inserted therebetween, fil-ters out advertising. This puts an end to real- -world span (the theft of visual atten-tion).
The term "theft" is used because a service (visual attention and the use of the individual's own personal thought and visual awareness space) has in the past been obtained without payment. With the apparatus of the invention, however; such theft is prevented. This is not to suggest that advertisements will no longer be seen, but, rather, just that they will be seen ~~hen the wearer wishes, or when payment is received.
In the event that the official is deaf. instructions are also printed on a sign 680 attached to the wearer. Preferably the sign is attached to the bottom of keypad 670 so that it is approximately close to eye level for easy reading by the official.
An important aspect of the invention is to recognize that officials' time is very important. unlike the time of the wearer, which is relatively worthless.
Accordingly.

in recognition of the very high value of an official's time, and of the very low value of the wearer's time, a message from the loudspeaker is triggered by a machine vision algorithm running on camera 640. The message says ''Your organization's time is very important to me. so PLEASE WAIT for my next available moment!'' .
FIG. 7 shows an embodiment of flue invention comprising a palm reader that captures and holds an official's palm 700 in place. Registration pins 710 guide the official's palm into the apparatus. Restraining devices 720 lock the official's hand into the device so that the official cannot withdraw or move the hand until the scanning process is complete. This is analogous to the "airlock" style entrance into many banks in which the customer is held captive until some process or decision is completed (or at least until a first door is closed).
Norrnallv fire regulations would prohibit confinement of an individual in a build-ing. However, establishments typically provide provisions for such confinement, by having systems that unlock after a certain time delay when a fire alarm is sounded.
Sometimes the systems sound the fire alarm and then unlock it, 30 seconds later. One typically sees signs with words like "E1VIER.GENCY EXIT UNLOCKED BY FIRE
ALARM'' .
Accordingly, the invention is similarly e<luipped to free the official in response to a fire alarm. Processor 730 controls the restraining devices 720. Processor 730 is also responsive to fire alarm sensor 740 which either detects the fire alarm audibly, or by a secure wireless conmxunications nE;tworlc connected to processor 730.
The official can also request to be freecrl of this grip by pressing a special button on the apparatus, similar to the pushbutton on the side of an exit door that one needs to push to make a request to be released from a building. In some cases an intercom can be used for this purpose.
Ordinarily an intercom would not be necessary; but for the fact that the wearer of the palm reading apparatus might also be wearing a headset that blocks out sounds of strangers, and if the official ha,s not yet had his or her palm scan completed he or slue is still a stranger and therefore must talk to the wearer of the apparatus through the wearer's personal intercom.
Communication through the intercom also ensures that all conversations can be recorded for quality control and training purposes.

FIG. 8 shows an embodiment of the invention mounted im a briefcase 800 to be car-ried by individual lOlA. Within the context of the business method disclosed herein, the briefcase 800 is preferably at least partially owned by an entity other than the owner. If the briefcase is purchased by the owner, the individual lOlA (owner) may choose to sell a partial interest in the briefcase to SI\-IO 102B so that the owner can truthfully sa,y it is not (entirely) his briefcase. Such a business arrangement can work as a freetime corporatizer. The briefcase is symbolic of business, and is therefore an ideal article to use for freetime corporatization. Additionally. an individual lOlA
can request, through the business model of this invention, employment as a courier to deliver a sheet of paper from his 510 to whereever he happens to be going (e.g.
for a vacation, or the like). This request therefore can make the briefcase 800 mean business. Preferably the piece of paper is a. confidential document and preferably the individual lOlA is bound not to disclose the confidential document to strangers.
Accordingly, the briefcase 800 has locks 810 along with thumbwheel combination lock inputs that comprise a denializer 820. The denializcr 820 provides the individual lOlA
with a convenient way of forgetting the combination number so that the individual lOlA needs remote assistance from his S11O 102B to open the briefcase. Thus when required (such as by an official) to open the briefcase 800, the individual provides the official with a submission interface 103C which takes the form of two fingerprint scan-ners 830. The system has at least one mode of operation in which the briefcase cannot be opened by the owner. For example; there may be two combination numbers, a first one which opens the briefcase and another which additionally requires thumb prints from a person other than the owner to o~~en the briefcase. If the owner conveniently forgets the first combination number, than tlzc: owner needs the clerk 102A to assist by providing additional thumb prints to opera the case. This need is accomplished by previously storing thumb prints by the briefcase, so that the system rejects the owner's thumb prints. This indirectly allows the owner to force the clerk 102A
to be fingerprinted in order to fulfill the clerk's request for a search of the case. Directly, the owner is bound by the situation (having forgot the direct opening number) to the freedom of submissional reciprocity. Thus the user is bound to require the clerk 102A
to be submissive in order for the user to submit to the clerk's demands for a.
search of the case.

This makes the process of opening the case a collaborative process rather than just following orders. Alternatively, the SWO may he involved. There may be, in some embodiments, a third combination number that requires remote rather than just, local help. The third combination cumber is only known to the Sl~IO, and a method of doing business of personal safety includes the steps of:
~ When a, clerk 102A demands that the owner open up briefcase 800, the owner informs the clerk that only the S1~IO knows the combination to open the case.
. The owner provides clerk 102A with means for contacting the SVIO.
~ If the clerk contacts the S~IO, the S~IO informs the clerk that the combination cannot be given to strangers, or to the owner of the briefcase 800, and that the clerk needs to fax a. photocopy of the clerk's identification, and that the clerk needs to agree to certain terms such as a Non Disclosure Agrement (NDA).
~ Tf the clerk complies by sending a photocopy of identification and agreeing to the terms, the S1~Z0 provides the: clerk with the third combination number to open the case, or to allow t:he owner of the case to open it.
FIG. 9 shows an improved fingerprint, scanning briefcase lock. A touch surface 930 is for receiving the pressing of a thumb (for being fingerprinted). Touch surface 930 is a holographic optical element (HOE) or is by total internal refraction.
A light source 931 comprises laser diodes or LEDs. A sensor array 932 provides an image to computer 940. Computer 940 is preferably housed within the briefcase. A
radio transmitter sends the fingerprints to a remote Sl~IO by way of antenna 941 inside the briefcase, which is received by antenna 942 on building 943 of S1~T0 headquarters, or by a local celhzlar radio site. If the connection is poor, the method of doing business of the invention can allow the owner of the case to require that the case be brought near a window, or the like; for proper radio reception. The requirement of proper radio reception can be a submissivity symretrizer (e.g. official 102A must submit to this requirement in order for individual 101A to submit to a search requirement of the case).
A shroud 950 prevents the official 102A from inserting his or her fingers in the wrong direction; or poorly. The shroud requires that the two thumbs of official 102A

be each respectively inserted into the fingerprint sc;a,nners, in order for the case to be opened for a search by official 102A.
Since the shrouds 950 control which way the official's thumbs are inserted to opera the briefcase, the system can be arranged to have the official's face be centered with respect to the briefcase. With thumbs spread across the width of the case, and angled in the same direction; the officia,l~s face must almost certainly be facing the case. Therefore, in some embodiments of the invention, there is a camera in the central portion of the briefcase to record the entire search process, and keep a log of the face of the official together with fingerprints. as well as an audio recording of the conversation. Additionally. a contents sensor determines the contents of the briefcase before and after the search. Any differences in the contents of the case, before and after the search, a.re logged together with the video record of the search and the official's fingerprints.
Additionally, in another embodiment of the invention. a fingerprint scanner is fitted into the handle 900 of the briefcase, so that whoever picks up the briefcase is fingerprinted. Thus when asked for identification individual lOlA can say to official 102A; ''Here, hold my briefcase while I take out my wallet.'' .
This final embodiment is a fingerprinter based on a concomitant cover activity.
Similar to the way the wristwatch camera has a concomitant cover activity of checking the time. the briefcase of this final embodiment ha,s the concomitant cover activity of being held.
Many other embodiments of the invention disclosed herein ca,n also use concomi-tant cover activities. For example, the fingerprint scanner ca,n be disguised as a pushbutton, with a label saying vpress here to see owner's identification" , as in the embodiment of Fig. 2.
FIG. 10 shows an embodiment of the invention that takes the form of a Point of Purchase (PoP) terminal 1000. A keypad 1010 accepts input from a individual lOlA
(payer). A clerk 102A is paid by way of a payment envelope 1020, only after certain conditions are met.
The device might, for example, be used by the pyyer to pay for having stayed at a hotel, or having eaten at a, restaurant, or the like; in which the payer might have had some important and confidential business meetings, or shown some confidential business documents to some business associates. A hotel is an example of a rented space, wherein the hotel owner (through a clerk 102A) often sets terms and conditions of the rental. The Point of Purchase (PoP) terminal 1000 allows the individual lOlA
(payer) to also impose conditions on the recipient (clerk 102A) binding upon the owner of the establishment.
Terms and conditions of the transaction ma,y be printed on payment envelope 1020, in the form of a shrinkwrap style license such as is often used on computer programs that are sold for profit (computer programs that are articles or goods of commerce are often called ''software" , and the terms a,nd conditions in the packaging are often called a ''software license agreement'' ).
The shrinkwrap style licenses on computer programs that are sold for profit are of-ten ridiculously broad in scope, despite tile questionable enforceability therein. How-ever, the overly broad (often to the point of being silly or laughable) conditions of such license agreements appears to have some valve as a deterrent.
Regardless of the degree of enforceability of such licenses or terms, they appear to have utility, and hence may equally well apply to point of purcase as to point of sale. The term Point of Purchase refers t,o a buyer-driven infrastructure as opposed to the seller-driven infractructiire of a Point, of Sale (PoS) terminal.
Point of Purchase (PoP) terminal 1000 stores envelope 1020, which is shown in a retracted position 1030 prior to being dispensed. Inside the terminal 1000, the enve-lope is automatically loaded with payment,, either in the form of cash automatically inserted therein, or in the form of credit card payment.
Alternatively, the payer can insert the correct amount of payment into the en-velope and place it in position 1020, locking the terminal 1000, so that the payer can articulably deny an ability to open the terminal 1000 without compliance by or assistance from the recipient.
In an automatic version of this embodiment of the invention, bank notes or one or more credit cards form potential payment 1090 which is inserted by the payer into the terminal 1000. In the manual version of this embodiment of the invention, the actual payment is inserted (e.g. the correct sum of cash, or just one credit card that the payer intends to use in the payment).
Terminal 1000 preferably has at least one mode of operation in which the payer can lock it in such a way that the payer cannot open it without assistance from the recipient, or in which the payer can articulate an inability to open it without assistance from the recipient. An LCD display screen 1040 assists the payer in articulating this inability. For example, the payer can press his thumb against fingerprint scanner 1070 to demonstrate to the recipient that the payer is unable to open the terminal 1000.
The LCD display screen 1040 is dymanic and begins with instructions to recipient, but can also display a message such as ''Payer's fingerprint detected, therefore cannot dispense.'' at the exact time that the payer presses his own thumb against his terminal 1000. This dynamic response of the device will help convince the recipient flat the system is real (e.g. not a joke).
Additional fixed signage 1050 (not a dynamic display) further indicates that payer cannot open his own terminal without recipient's assistance or cooperation.
This makes it clear that there is no unwillingness to pay, on the part of the payer. Instruc-tions 1060 indicate where to press on fingerprint scanner 1070, but without identifying fingerprint scanner 1070 as a fingerprint scanner. Thus "press here" is a concomitant cover activity for covertly capturing a. fingerprint of the recipient, in order to reduce crime by paying unidentified strangers. c>r allowing unidentified strangers to handle the corporate credit card, or the corporatized crec:lit card.
Potential payment 10~J0 may be corporate money (e.g. from a petty cash fund, or a corporate credit card), or it may be corporatized personal money.
Corporatized personal money is money that can be willfully deposited by the payer, into the system that is beyond control, or articulately beyond control of the payer. In this way, the terminal 1000 can perform the function of a freewill corporatizcr 1080, by allowing the payer to bind himself to certain lack of freedom provided by terminal 1000. For example. terminal 1000 allows the user to give up the freedom to pay outside the terms set forth by terminal 1000. Freewill corporatizer 1080 can simply be a slot that individual 101A inserts all of leis money into, so that he cannot pay without the assistance of the person wishing to receive payment.
It is common, when reserving a hotel room, and paying for it in advance, that there are terms and conditions foisted upon the individual 101A by a clerk 102A upon later arriving a,t the hotel to check in, even though these terms were never made known to individual lOlA prior to payment. Accordingly, if this action is considered fair and just, then so must the action afforded by this embodiment of the invention.
FIG 11 depicts a liabilizer of the invention. Ordinarily individual lOlA is under scrutiny from cameras 1000 installed in the environment. which clerk 102A will deny havin g any responsibility for. However, with the apparatus of the invention, individ-ual lOlA may wear a camera 1020 and deny having direct control over the cannera 1020, which can be attributed to being part of a. personal safety monitoring apparatus required by a Sl~MO 102B. In this embodiment, apparatus 1110A preferably includes also a medical monitoring apparatus, or other apparatus that monitors at least. one parameter of individual 101A. Thus apparatus 1110A then measures individual lOlA
as well as the environment around individual lOlA. A satisfactory parameter to mea-sure from individual lOlA is heart rate, or complete ECG waveform. This additional feature can therefore be a concornita,nt liabilizer, in the sense that tlxose asking indi-vidual lOlA to remove or disable the apparatus run the risk that tlxeir request would interrupt important medical diagnostic function. For example, shutdown of appara~
tus 1110A may result in failure to correctly diagnose a heart condition; such that clerk 102A could be held, at least partially, liable for the failure of apparatus 1110A
to discover a heart problem with individual lOlA, which would otherwise have been discovered and treated at the next analysis of the data recorded by apparatus 1110A.
In this sense, the apparatus 1110A is like the flight recorder of an aircraft, which could provide important information regarding the cause of a malfunction.
Certainly if there was an airline crash, and a specific person was found to have deliberately disabled the flight recorder, or had demanded that it be disabled, that individual might assume some liability for the crash, or at least for the inability of its cause having been determined (and therefore if another crash was caused by similar cause that might have been averted with the data of the previous flight recorder;
that individual might be liable).
Similarly, a, personal plight recorder in the apparatus 1110A could be said to be important in medical or other safety diagnostic function, such that a clerk 102A asking the plight recorder be disabled, or attempting to interfere with the plight recorder, would either assume liability, or at the very least, could be presented with a fear of liability, such that clerk 102A might back down and allow the device to continue running.

FIG 12 depicts a personal safety device in which cabling 1210 encircles the wearer (individual lOlA) of the apparatus. Cabling 121.0 is typically made of heavy security cable, which is similar to aircraft cable but designed so that it cannot be easily cut with bolt cutters, hacksaws, or the like. In this way, clothing incorporating cabling 1210 cannot be easily removed by individuals who might attack the wearer (individual lOlA). Cabling 1210 is typically locked together by means that only the wearer can open, possibly only in collaboration with an external entity. A remote escrow can also be used to protect the wearer from torture or other forms of forced disclosure or forced operation of the unlocking means.
Should adversaries attempt to undress the wearer by drastic measures such as liquid nitrogen or acetylene cutting torches, once the circuit comprising cabling 1210 is broken, thyristor 1220 switches on by way of resistor 1230 between its anode and gate. When thyristor (typically am SCR) 1220 is turned on, current from high voltage power supply 1240. and parallel capacitor 1241 completely destroys apparatus lOlOA.
Insofar as apparatus lOlOA might be or include a life--support system, or for other reasons that cutting through cabling 1210 could result in death of the wearer (individ-ual lOlA), the embodiment disclosed herein includes the function of a liabilizer. The liabilizer makes the perpetrator of the action of attacking individual lOlA
responsible or liable for certain unpredictable or unknowable behaviour of the system.
It is preferable that cabling 1210 be sufficiently durable as to withstand most moderate attempts to remove apparatus lOlOA, and that cabling 1210 be in two stages, a first stage of cutting through which activates a distress signal indicating an attempt to injure, or possibly kill wearer 1200. Chemicals, for example, a marker chemical such as that. sold under the trade came Dye Witness (T~-T), are preferably automatically released, under extremely high pressure, by apparatus lOlOA, at a first stage of attempted disrobing loy assailants. In this way, the perpetrators of the attempted murder or similar crime will be identifiable, and will also be discouraged from cutting further through cabling 1211) after knowing that they have already been so marked for identification. liIoreover. the crime scene will be marked.
F~irthermore, very loud ear-piercing alarms may be activated, in response to initial attempts to remove apparatus lOlOA, to scare off attackers or to interfere with their ability to continue to concentrate on their activity.

In addition to video surveillance, another way that building owners stake ottt their own territory is through display media, both in the form of advertising (billboards, and other visual detritus), as well as in the form of intimidating material such as signs reading "shoplifters will be prosecuted'' . and the like. Other examples of intimidating material include television sets hanging from the ceiling of department stores, a,nd the like. upon which there is displayed video from one or more surveillance cameras, as a constant reminder to individual 101A that he is being under scrutiny. This panoptic environment is intended to act as a visible deterrent to keep individual lOlA
obedient.
FIG. 13 shows a similar visible deterrent wore by individual lOlA. The wearable camera 1020 is preferably covertly concealed in eyeglasses, so that the camera itself is not visible. A chest worn miniature video projcector 1300 projects an image from camera 1020 onto the floor in front of the wearer's feet. Thus the wearer (individual lOlA) may look at a clerk 102A and capture a freeze frame image of the clerk, and then project this image onto the floor as projected image 1310. The image is projected in front of the feet of the wearer, while the wearer is walking forward. The clerk 102A
can see his face on the floor in front of the wearer's marching feet. This establishes a visible deterrent to clerk 102A that prevents clerk 102A from committing criminal acts. Additionally, other indicia and messages may be displayed on projected image 1310, such as "Picture Transmitted Successfmlly - Remote Archive Successful in Five of the Thirteen Designated Countries." .
Other messages such as ''Foi° YOUR, protection, a video record of you and your establishment rn,rzy be transmitted and recorded at remote locations - ALL
CRI~'I-INAL ACTS PROSECUTED." , or ''llislcading advertising is a crime!" . or the like.
Advertising to a captive audience is well known in the art. For example; adver-tisements above urinals and in toilet compartments are well known. Since individual lOlA must eventually use a toilet, individual lOlA is a captive audience to these advertisements, as well as other advertisements throughout the environment.
Therefore, Additionally, the individual lOlA may display advertisments and other visual detritus for the enjoyment of clerk 102A, especially if clerk 102A is a captive audience, as might hapen when clerk 102 A works somewhere and cannot leave the premises.
This situation is especially effective if individual lOlA is bound by an agreement with advertisers that requires him t,o display the advertisements, so that lie is a,n em-ployee acting out the requiren rents of a, remote SJIO 102B when displaying advertising material in public.
FIG. 14 depicts a Polymer Dispersed Liquid Crystal (PDLC), or Polymer Sta-bilized Liquid Crystal (PSLC) secure press-per-view system. Container 1400 has at least one mode of operation in which it cannot be opened by its owner without re-mote assistance. An identifier 1470 such as a fingerprint scanner preferably has a concomitant cover activity as a button, lnxshbutton, or the like, with signage indicating its function and th a fact that the owner cannot activate the viewing capa-bility afforded by window 1499.
A viewing window 1499 is ordinarily frosty, diffuse, or dark, unless the window is ''unlocked'' (made clear, transparent, or light) by someone other than the owner pressing and holding fingerprint scanner or other identifier 1470. Window 1499 re-mains clear, transparent, or light for as long as identifier 1470 is identifying (e.g. a fingerprint scanner being "pressed" ) (e.g. for a,s long as identifier 1470 such as a fingerprint scanner has a valid fingerprint pressed against its scanning surface).
A satisfactory material for tile construction of win dow 1499 is Polymer Dispersed Liquid Crystal (PDLC), or Polymer Stabilized Liquid Crystal (PSLC). Other elec-trochromic materials may also be used in the construction of window 1499.
PDLC is a very low cost material available from various manufacturers, such a.s ALCOM. In commercial applications. in sheet form, PDLC often costs $100 or less per square n xeter; such that the cost of manufacturing one standard ID card sized window made of this material might be expected to be less than one dollar, in sufficient quantity.
The ITO (indium-tin oxide) coating is typical of what is used in LCDs (Liquid Crystal Displays). A first coating of ITO separated from a second coating by an insulating layer, is controlled or switched by way of a processor responsive to an input from identifier 1470. An electronic shutter may thus be implemented by induced current received in response to a, valid fingerprint scan.
This embodiment of the invention has the added advantage of a two step process in which an official wishing to see identification must submit to a first requirement to view the identification (through the viewing window), and must submit to a further requirement (e.g. to open the container) in order to physically hold onto the iden ti-fication. In this way, a portion of the identification (such as the last four members of a passport number) may be obscu rred, such that a non government ofI'xcal (such as an airline clerk) can check that individual lOlA has a valid passport, but cannot copy down the complete number, by completing only the first step of the two step process. A customs official who may rc:q~xire the entire passport information can be gxxided through the second step of the twc~ step process.
Such a device therefore allows a sometimes necessary disclosure of partial infor-mation while preventing identity theft that often arises by way of a large number of strangers having complete access to personal information.
This embodiment of the invention may also include an active display panel 1440.
Display panel 1440; if present, is preferably responsive to an input from the identifier 1470. The indentifier 1470 need not necessarily be a, fingerprint scanner, for example, it could be a face recognizing camera or other device.
The apparatus of this invention allows the wearer to enjoy the benefits that nor-mally only go to building owners. Benefits include safety, security, and the ability to not interact with strangers, as well as the ability to be bound to the freedoms that ordinarily only go to building owners or others who ca,n be bound by a remote manager.
Moreover, just as buildings often have video surveillance systems and biometrics, the user of the apparatus also has a similar personal safety device, that keeps a record of irxteractions between the user and his~lxer environment.
In many ways, the apparatus may be thought of as a building built for one occu-pant. The apparatus may be of particular benefit to the lxomeless, who have no place to call their own, and who are often stopped and asked for identification by people who do not show them identification.
The invention also provides a method of doing business in which an individual is bound to freedom, or in which the invidual need at most engage in a mutually (reciprocally) submissive activity rather t.ha,n a wholly one-sided submissive activity.
For example, the S1VI0 can allow the individual to be hound to freedom in other ways. In another such embodiment of a, freedom binder, the invidual not wishing to have his or her photograph or fingerprints stolen can sell them to an SNIO, or give an Sl~MO an exclusive license on this material. This binds the individual to freedom from theft of humanistic property; and a sW table method of doing business in such freedom binding is as follows:
~ accept a request. from an individual;
. bind the individual legally to comply with that request;
~ provide the individual with a copy of a contract so binding. and an articula-ble basis upon which to provide to others, of the limitations imposed on the individual:
~ accept inquiries from persons wishing to violate the individual's freedom;
. inform persons making such inquiries that the individual is bound by the con-tract.
An example contract for photographic; rights, wherein the individual can refuse to have a picture stolen for an ID card without offending an organization in a personal sense, is as follows:
Humanistic Property License Agreement l~ __________________________ (hereafter referred to as Licensee) wish to obtain a one-time limited-use license for Humanistic Property from ___________________________ (herafter referred to as Licensor), where said license (hereafter referred to as License) for Humanistic Property comprises the use of image data bearing the physical likeness of Licensor.
I understand that said image and data pertaining to said image is the property of Licensor, and shall remain so indefinitely.
I further understand that this License permits me to acquire an electronic image (hereafter referred to as Humanistic Property) bearing the likeness of Licensee for the sole purpose of printing and providing Licensor with an identification card. I further agree that after issuing Licensee said identification card, that I may not save or record in any manner said Humanistic Property, or any portion thereof.
Furthermore, I assert that after a time period not to exceed five minutes after said identification card is printed, that said identification card shall be the sole record of said Humanistic Property, and that there shall be no other record of said Humanistic Property, whether retained mechanically, optically, electronically, or otherwise. I understand that any such other record of said Humanistic Property is stolen Humanistic Property.
I understand that my f ailing to permanently delete and erase all manner of said Humanistic Property other than one copy printed on said identification card shall constitute theft of said Humanistic Property.
I further understand that failing to permanently delete and erase all manner of said Humanistic Property shall constitute an assignment of any material, media, and image storage system, whether mechanical, optical, electronic, or otherwise, that contains or contained stolen Humanistic Property, to Licensor.
I agree that said assignment of said material, media, and image storage system, whether mechanical, optical, electronic, or otherwise, that contains stolen Humanistic Property shall include, at Licensor's discretion, any components of Licensee's computer system that Licensor wishes to sieze, including but not limited to hard disk drives, backup tapes, storage media, and computer networks.
I assert that I have authority to make this assignment should stolen Humanistic Property have passed through any of the computer networks of the organizations) of which I am a representative.
I further agree that the future existence of said stolen Humanistic Property shall constitute proof of said theft, whether said stolen Humanistic Property 3 E~

exists in any form within my organization or after transfer to another organization or entity, and that said existence of said stolen Humanistic Property shall be sufficient grounds for Licensor to sieze any and all equipment which Licensee reasonably believes may contain or may have contained, transmitted, transferred, or processed said stolen Humanistic Property.
signature date Similarly, an individual can be bound to intellectual freedom by licensing present and future inventions, thoughts, and ideas, to a public licensing authority. A
person might, for example, choose to be forbidden from learning anything not under GPL
(GNU Public License).
Alternatively, the method of doing business can allow a person to do a five minute job (short tune employment) that comes with terms of a contract that prevent the person from doing certain activity for a p t o one year after the end of the employment.
The purpose of such a, short employment term can be to bind the individual to freedom, using a framework future employers all understand, namely terms of previous employment .
From the foregoing description, it will tlms be evident that the present invention provides a design for a personal safety and security system. As various changes can be made in the above embodiments and operating methods without departing from the spirit or scope of the invention, it is intendec.l that a,ll matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limiting sense.
Variations or modifications to the design and construction of this invention, within the scope of the invention; may occur to those skilled in the art upon reviewing the disclosure herein. Such variations or modifications, if within the spirit of this invention, are intended to be encompassed within tine scope of any claims to patent protection issuing upon this invention.

Claims (90)

1. A method of providing a personal freedom service for allowing a person or group of persons to articulate external forces that maintain stability, safety, or rationale for not submitting entirely to the requests of others, said method comprising the steps of a Safety Management Organization:

.cndot. allowing a user of said method to choose a contract having terms that the user wishes to be bound by;
.cndot. providing the user with at least one task that requires that the user be bound by the terms that said user wishes to be bound by;
.cndot. providing said user with means, apparatus, or method of presenting to entities in violation of said terms an articulable basis upon which said user is bound by said terms.
2. The method of claim 1, where said method to choose a contract is selection from a menu of contracts, each of said contracts associated with at least one task for which said terms are required of said user.
3. The method of claim 1, where said method to choose a contract is selection from a menu of contracts, each contract associated with a plurality of tasks;
for which said terms are required of said user, said method of providing a personal freedom service further including a method of providing said user with a choice among said plurality of tasks each associated with the same contract.
4. The method of claim 1, where said method to choose terms is a method of allow-ing said user to draft said terms, and to propose that said terms be associated with at least one task for which said terms be required of said user.
5. The method of claim 1, where said task involves the control of funds.
6. The method of claim 1, where said task requires said user to manage funds from said Safety Management Organization not to exceed an amount of funds already provided by said user to said Safety Management Organization.
7. The method of claim 1, where said task involves the management of a means of credit payment and the responsible handling of said means.
8. The method of claim 1, where said task involves the management of a means of credit payment and the responsible handling of said means, a maximum amount of said credit payment not to exceed money to have been already provided by said user to said Safety Management Organization.
9. A system for allowing a person or group of persons to articulate external forces that maintain stability, safety, or rationale for not submitting entirely to the requests of others, said system including:

.cndot. a freedom binder.

.cndot. a deniabilizer, said deniabilizer, in at least one mode of operation of said personal safety system, allowing the user of said personal safety system to be articulably uncertain as to whether or not being free of being bound by said freedom binder requires authorization beyond the immediate control of said user of said personal safety system.
10. The system of claim 9, further including an articulable basis for receiving a corrective signal in response to noncompliance with said freedom binder.
11. The system of claim 9, where said system includes a, wearable device, and said freedom binder is being bound to wear said device.
12. The system of claim 9, where said system includes a wearable device, and said freedom binder is being bound to wear said device, and where said system also includes a liabilizer.
13. The system of claim 9, where said system includes a wearable device, and said freedom binder is being bound to wear said device, and where said system also includes a liabilizer, said liabilizer including a monitoring device for monitoring at least one physiological quantity.
14. The system of claim 9, comprising a container for personal effects, said freedom binder including a deterrent to submission of search of said container without prior submission of a requester conducting said search to certain terms, said de-niabilizer including means for bypassing said deterrent, said means for bypassing said deterrent including a forgettable mode.
15. The personal safety system of claim 14 in which said container is an encrypted file, and said lock is the encryption of said file, and said unlocking of said lock is the decryption of said file.
16. A method of doing business of personal safety with a user of the apparatus of claim 14, said method including the steps of:

.cndot. requiring the user to require the requester of the search to submit to certain predetermined requirements, .cndot. requiring the user to provide evidence that the requester of said search has submitted to said predetermined requirements, .cndot. supplying the user with knowledge of said means for bypassing said deter-rent, only once said evidence has been provided.
17. A method of doing business of personal safety with a user of the apparatus of claim 14. said method including the steps of:

.cndot. requiring the user to require the requester of the search to complete a search request form provided to the requester by the user, .cndot. requiring the user to fax a copy, upon completion by said requester, of said search request form to a remote location in exchange for knowledge of said means of bypassing said deterrent.
18. The system of claim 14, said deterrent including a noise making device, said noise making device being activated while said container is open, said denia-bilizer including a forgettable mode in which to open said container without activating said noise making device.
19. A briefcase including the system of claim 14, said freedom binder including a noise making device, said briefcase having a lock, said lock having two modes of operation:

.cndot. a first forgettable mode of operation for opening said briefcase without activating said deterrent, .cndot. a second mode of operation for opening said briefcase while activating said deterrent.
20. A briefcase including the system of claim 14, said freedom binder including a noise making device, said briefcase having a lock, said lock having three modes of operation:

.cndot. a first forgettable mode of operation for opening said briefcase without activating said deterrent, .cndot. a second mode of operation for opening said briefcase while activating said deterrent, .cndot. a third mode of operation for opening said briefcase in response to remote authorization, said third mode not activating said deterrent.
21. A briefcase including the system of claim 14, said freedom binder including a noise making device, said briefcase having a lock, said lock having two modes of operation:

.cndot. a first mode of operation for opening said briefcase without activating said deterrent, .cndot. a second mode of operation for opening said briefcase while activating said deterrent, said first mode of operation requiring remote authorization.
22. The briefcase of claim 19, where said deterrent is an irritant.
23. The briefcase of claim 19, where said deterrent is a noise producing device.
24. The briefcase of claim 19, where said deterrent is a photographic picture taking device, including an electronic flash to repeatedly take pictures of a person searching said briefcase.
25. A system for keeping confidential documents, corporate property, business plans, or the like, safe from scrutiny by strangers, while being carried, said system comprising:

.cndot. a carrying case;
.cndot. at least one imager borne by said carrying case;
.cndot. at least one lock, said imager operable when said case is closed, and said lock responsive to an output of said imager.
26. A method of doing business of personal safety with a user of the carrying case described in claim 25, said method including the steps of:

.cndot. providing said user with means for forwarding requests from persons wish-ing to search said carrying case to a Safety Management Organization of said user;

.cndot. receiving a request at said Safety Management Organization from a person wishing to search said carrying case;

.cndot. processing said request at said Safety Management Organization;

.cndot. providing authorization from said Safety Management Organization to said user to open said carrying case, said user having am articulable basis upon which not to open said carrying case prior to receiving said authorization.
27. The system of claim 25 where said carrying case is a briefcase and where said images is a fingerprint scanner.
28. The system of claim 27 where said fingerprint scanner includes a shroud to prevent improperly inserted fingers.
29. The system of claim 27 where said fingerprint scanner is a first fingerprint scan-ner, and further including a second fingerprint scanner located far enough from said first fingerprint scanner that a single hand of a user cannot simultaneously reach both fingerprint scanners, said system having at least one mode of oper-ation in which unlocking said briefcase requires the simultaneous valid scan of at least two fingerprints.
30. The system of claim 29 further including a camera; borne by said briefcase, where said second fingerprint scanner also includes a shroud to prevent improp-erly inserted fingers, said shrouds both being oriented for positioning a person inserting fingers into the fingerprint scanners such that said person's face is in view of said camera when said persons fingers arc properly inserted into said fingerprint scanners.
31. A system for allowing a person to articulate external forces that maintain sta-bility, safety, or rationale for not submitting entirely to the requests of others, said system including:
.cndot. a portable container for being carried by said person:
.cndot. a lock for said portable container, said lock having at least two modes of operation, said modes comprising:
- a first mode in which said person can validly open said lock without assistance;
- a second mode in which said person cannot validly open said lock without assistance:
.cndot. a selector for selecting said second mode; said selector for being operable by said person, while said container is in transit by said person.
32. The system of claim 31 where said second mode is automatically selected when said person loses consciousness.
33. The system of claim 31 where said second mode is automatically selected when said container is separated from said person by more than a preset communi-canons distance.
34. The system of claim 31 where said second mode is automatically selected when said container is separated from a communications link.
35. The system of claim 31 where said second anode is selected by a control fixed to a handle for carrying said container, said control for being activated by said person.
36. A system for allowing a person or group of persons to articulate external forces that maintain stability. safety, or rationale for not submitting entirely to the requests of others, said system including:
.cndot. a lock, .cndot. a deniabilizer, said deniabilizer, in at least one mode of operation of said personal safety system, allowing the user of said personal safety system to be articulably uncertain as to whether or not unlocking said lock requires authorization beyond the immediate control of said user of said personal safety system.
37. The system of claim 36, further including an articulable basis upon which said user receives a corrective signal in response to attempts to circumvent said lock.
38. The system of claim 36, further including a deterrent in response to attempts by persons other than said user to circumvent said lock.
39. A personal safety system comprising a personal space, .cndot. a lock for said personal space;
.cndot. a freedom binder, .cndot. a deniabilizer, said deniabilizer, in at least one mode of operation of said personal safety system, allowing the user of said personal safety system to be articulably uncertain as to whether or not unlocking of said lock requires authorization beyond the control of said user of said personal safety system.
40. A personal safety system comprising .cndot. a personal space, .cndot. a lock for said personal space, .cndot. a freedom binder, .cndot. a device articulably expressible by a user of said personal safety system as having a possibility of communications capability with a remote entity, .cndot. a deniabilizer, said deniabilizer, in at least one mode of operation of said personal safety system, allowing the user of said personal safety- system to be articulably uncertain as to whether or not unlocking of said lock requires verifiability of compliance with said freedom binder, by way of said device.
41. The personal safety system of claim 39 in which said personal space is an en-crypted file, and said lock is the encryption of said file, and said unlocking of said lock is the decryption of said file.
42. A personal safety system comprising .cndot. a personal space.
.cndot. a lock for said personal space, .cndot. an identifier, .cndot. a deniabilizer, said deniabilizer, in at least one mode of operation of said personal safety system, allowing the user of said personal safety system to be articulably uncertain as to whether or not unlocking of said lock requires the successful transmission of data from said identifier, to at least one remote location.
43. A personal safety system comprising .cndot. a personal space, .cndot. a lock for said personal space which, in at least one mode of operation of said personal safety system cannot be opened by a user of said personal space, .cndot. an identifier, said lock, in at least one anode of operation of said personal safety system, responsive to an output of said identifier.
44. A personal safety system as described in Claim 43 where said personal safety system is wearable.
45. A personal safety system as described in Claim 44 where said personal space is an immersive visual space.
46. A personal safety system as described in Claim 45 where said personal safety system further includes chemical protection mean s for tile prevention of the bypass of said lock by an attacker.
47. A personal safety system as described in Claim 45 further including wireless communications capability with ones or more remote sites.
48. A personal safety system as described in Claim 45 where said lock is a visual filter preventing a wearer of said personal safety system from seeing certain things until said lock is unlocked.
49. A personal safety system as described in Claim 43 where said user is a first person, and where said personal space is such that a second person can insert a body part into said personal space, but not remove said body part until said personal space is unlocked.
50. A personal safety system as described in Claim 49 where said body part is a hand, and where said identifier is a palm reader.
51. A personal safety device comprising .cndot. an identifier, said identifier operable by insertion of a body part.
.cndot. a restrainer suitable for keeping said body part from being removed from said identifier, .cndot. a processor, said processor responsive to an output of said identifier, and said restrainer responsive to an output of said processor.
52. A personal safety device as described in Claim51, where said body part is a hand, and said identifier is a palm reader.
53. A personal safety device as described in Claim 52 further including means for conditional release of said hand, said conditional release based on information determined from said palm reader in conjunction with a database associated with said processor.
54. A personal safety device as described in Claim 52 further including means for conditional release of said hand, said conditional release based on information determined from said palm reader in conjunction with a database associated with said processor, such that if the identity of said person is found to be on a list of suspect officials; that said person's hand remains restrained in said palm reader even after said palm reader has finished performing its scanning operation.
55. The personal safety system of claim 43, further including a forgettable mode, said forgettable mode for allowing said user of said personal safety system to articulate an uncertainty as to whether or not said personal safety system is operating in said at least one mode.
56. The personal safety system of claim 43, having at least one mode of operation in which unlocking of said lock requires sucessful wireless communication with at least one remote location.
57. The personal safety system of claim 43, having at least one mode of operation in which unlocking of said lock articulably requires sucessful transmission of information from said identifier, to at least one remote location.
58. The personal safety system of claim 43, having at least one mode of operation in which a deniability articulator allows said user of said personal safety system to be articulably unsure as to whether or not the unlocking of said lock requires sucessful transmission of information from said identifier, to at least, one remote location.
59. The personal safety system as described in Claim 43 where said personal space is a container for personal effects.
60. The personal safety system as described in Claim 59 where said personal safety system has at least one forgettable mode of operation.
61. The personal safety system as described in claim 60 where said forgettable mode of operation is provided by way of a combination lock.
62. The personal safety system as described in Claim 61 where said container is a briefcase, and where said identifier includes at least one fingerprint scanner.
63. The personal safety system as described in Claim 61 where said container is a briefcase, and where said identifier includes two fingerprint scanners, where said briefcase further includes a second combination lock.
64. The briefcase described in claim 63 said briefcase having two latches, and a combination lock and fingerprint scanner for each of said two latches.
65. The briefcase described in claim 64 said briefcase having at least two combina-tion numbers to open said briefcase. said combination numbers comprising:
.cndot. a first combination number to unconditionally open said briefcase without pressing either of said fingerprint scanners, .cndot. a second combination number in which said briefcase can only be opened upon the successful simultaneous scan of two prints from a person other than the user of said briefcase, in addition to the correct entry of said second combination number.
66. The briefcase described in claim 64 said briefcase having at least two combina-tion numbers to open said briefcase, said combination numbers comprising:
.cndot. a first combination number to unconditionally open said briefcase without pressing either of said fingerprint scanners.
.cndot. a second combination number in which said briefcase can only be opened upon the successful simultaneous scan of two prints in addition to the correct entry of said second combination number, said briefcase further including a sensor sensing at least some of the contents of said briefcase, and a logger for logging content of said briefcase before being opened, and after being closed, said briefcase also logging any difference in said contents together with said prints.
67. A personal safety system as described in Claim 59 where said container is teth-ered to said user.
68. A personal safety system as described in Claim 67 where said tether is an irritant activated when said container is removed from said user.
69. A personal safety system as described in Claim 67 where said tether is a wireless chemical tether.
70. A personal safety system as described in Claim 59 where said container is a container for carrying at least one identification card.
71. A personal safety system as described in Claim 43 where said system further includes a computer or processor.
72. A personal safety system as described in Claim 43 where said system further includes a card reader to read the identity of an individual asking the user of said system for identification.
73. A personal safety system comprising .cndot. a portable container:
.cndot. a lock for said container which, in at least one mode of operation of said personal safety system cannot be opened by a user of said container;
.cndot. a processor or computer:
.cndot. a fingerprint scanner that unlocks said lock under certain conditions as de-termined by said processor or computer in comparing a fingerprint scanned by said fingerprint scanner with a database stored in said processor or com-puter.
74. The personal safety system of claim 73, where said database exists at a re-mote location, and where unlocking of said container requires, in at least one mode of operation of said personal safety system, the wireless transmission of a fingerprint scan from said fingerprint scanner to a remote location.
75. A personal safety system comprising a portable container;
.cndot. a lock for said container which cannot be opened by a user of said container;
.cndot. a processor or computer;
.cndot. a urine sample collector that unlocks said lock when a valid and acceptable urine sample is provided to said personal safety system, as determined by said processor or computer in comparing said urine sample with data in a database stored in said processor or computer.
76. A personal safety system comprising .cndot. a portable container for personal effects, .cndot. a processor or computer.
.cndot. a camera activated when said container is opened.
77. A personal safety system comprising .cndot. a computer, .cndot. a wearable fingerprint scanner.
where said computer is responsive to an output of said wearable fingerprint scanner.
78. A personal safety system comprising .cndot. a deterrent, .cndot. a portable container for personal effects, together with a processor and wireless receiver for said processor, said processor and said wireless receiver both borne by said container, .cndot. a wearable transmitter, said wireless receiver responsive to said wearable transmitter, said processor responsive to said wireless receiver, and said deterrent responsive to said pro-cessor, said deterrent activated when said container is removed from the vicinity of said transmitter.
79. A system for allowing a person or group of persons to articulate external forces that maintain stability, safety, or rationale for a specific structure of conditions associated with payment, said system including:
.cndot. a portable container for carrying payment:
.cndot. an identifier borne by said container;
.cndot. a payment dispensor, said payment dispensor activated by said identifier.
80. The system of claim 79 where said identifier is a fingerprint scanner.
81. The system of claim 79 including usage instructions borne by said container, said usage instructions indicating that payer cannot open said container or activate payment.
82. The system of claim 79 including a deniabilizer. said deniabilizer, in at least one mode of operation of said system, allowing the user of said system to be articulably uncertain as to whether or not release of payment requires input from said identifier.
83. A system for allowing a person or group of persons to articulate external forces that maintain stability, safety, or rationale for not submitting entirely to the requests of others, said system including:
.cndot. a body worn computer system:
.cndot. a liabilizer, said liabilizer, in at least one mode of operation of said per-sonal safety system, allowing the user of said personal safety system to be articulably uncertain as to whether or not removal of said body worn computer system requires authorization beyond the immediate control of said user of said personal safety system.
84. The system of claim 83, where said liabilizer includes at least one device for monitoring at least one physiological quantity of a wearer of said body worn computer system.
85. The system of claim 83, when a said liabilizer includes a security cable running through at least one garment, a portion of said system being damaged by tam-pering with said security cable.
86. The system of claim 83, where said liabilizer includes a security cable running through at least one garment, and an articulable basis upon which to indi-cate damage to a wearer of said system would result from tampering with said security cable.
87. A system for allowing a person or group of persons to articulate external forces that maintain stability, safety, or rationale for not submitting entirely to the requests of others, said system including:
.cndot. a body worn computer system:
.cndot. a projector for being worn by a wearer of said body worn computer system;
said projector responsive to an output of said body worn computer system.
88. The system of claim 87, further including a personal image capture system, said projector responsive to an output of said personal image capture system.
89. A container including:
.cndot. an identifier;
.cndot. a processor responsive to an output of said identifier;
.cndot. a viewing window responsive to an output of said processor, said viewing window having at least two modes of operation, a first mode in which said viewing window is less clear, and a second mode in which said viewing window is more clear, said processor selecting said second mode in response to receiving an identifying characteristic from said identifier.
90. The container of claim 89 where said viewing window contains one of .cndot. a Polymer Dispersed Liquid Crystal (PDLC);
.cndot. a Polymer Stabilized Liquid Crystal (PSLC);
.cndot. an electrochromic material.
CA002323153A 2000-10-13 2000-10-13 Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations Abandoned CA2323153A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002323153A CA2323153A1 (en) 2000-10-13 2000-10-13 Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002323153A CA2323153A1 (en) 2000-10-13 2000-10-13 Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations

Publications (1)

Publication Number Publication Date
CA2323153A1 true CA2323153A1 (en) 2002-04-13

Family

ID=4167364

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002323153A Abandoned CA2323153A1 (en) 2000-10-13 2000-10-13 Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations

Country Status (1)

Country Link
CA (1) CA2323153A1 (en)

Similar Documents

Publication Publication Date Title
Marx Ethics for the new surveillance
US20020057915A1 (en) Method and apparatus for enhancing personal safety with conspicuously concealed, incidentalist, concomitant, or deniable remote monitoring possibilities of a witnessential network, or the like
US7139914B2 (en) System and method for network security
US6446862B1 (en) Point of purchase (PoP) terminal
US20100100406A1 (en) Method for protecting personal identity information
US20050010796A1 (en) Method of secure personal identification, information processing, and precise point of contact location and timing
Nieto et al. Public and private applications of video surveillance and biometric technologies
US20110266350A1 (en) Multiface document
JP2006527422A (en) Systems and information regarding secure personal authentication, information processing, and precise timing of contact location and timing
CN110163120A (en) A kind of Internet bar&#39;s system of real name application system based on recognition of face
Sennewald et al. Retail crime, security, and loss prevention: An encyclopedic reference
Norman Integrated security systems design: concepts, specifications, and implementation
Jain Atm frauds: Detection & prevention
Keenan Invasion of privacy: A reference handbook
CA2323153A1 (en) Business method and apparatus for ensuring the safety and protecti0n of personal or informatic property or for ensuring personal safety or respect by articulably external situations
Gupta et al. A review of literature on the recent developments in the application of electronic security system in libraries
Purpura Internal Threats and Countermeasures
US7690563B2 (en) Transaction security system
US20040260661A1 (en) Security mailing system
RU2665895C2 (en) Method of banknote processing
TWI891239B (en) Document handler with camera device for taking pictures of document-inputter&#39;s face
Marx Privacy and the Home: The King Doesn't Have to Enter Your Cottage to Invade Your Privacy
JP2008203954A (en) Prevention system of fraudulent transaction by forged card, facility terminal monitoring server, atm monitoring server, atm monitoring method, program
JP7465050B2 (en) Banknote Processing Device
CA2357697A1 (en) Method and apparatus for enhancing personal safety with conspicuously concealed, incidentalist, concomitant, or deniable remote monitoring possibilities of a witnessential network, or the like

Legal Events

Date Code Title Description
EEER Examination request
FZDE Dead