Contraband detection through smart power components

ABSTRACT

A method and system for contraband detection is provided that allows for the determining whether devices are authorized to receive power from an outlet. A power adapter and/or an outlet authenticate a device when it is connected to the outlet through the power adapter. On the basis of this authentication, a determination is made whether the devices are to receive power from the outlet. If the device is authorized, the outlet is activated, transitioning from inactive state (where no power is relayed through the outlet) to an active state (where power is relayed through the outlet).

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. Nonprovisional patentapplication Ser. No. 16/821,222, filed Mar. 17, 2020, which is acontinuation of U.S. Nonprovisional patent application Ser. No.16/155,518, filed Oct. 9, 2018, now U.S. Pat. No. 10,594,090, issuedMar. 17, 2020, titled “Contraband Detection Through Smart PowerComponents,” which is a divisional of U.S. Nonprovisional patentapplication Ser. No. 15/710,203, filed Sep. 20, 2017, not U.S. Pat. No.10,096,951, titled “Contraband Detection Through Smart PowerComponents,” the contents of which are hereby incorporated herein byreference in its entirety.

BACKGROUND Field

This disclosure relates to detecting contraband devices through smartpower components.

Background

In a controlled environment, such as a prison, there is a need foradministrators to control and manage usage of devices within theenvironment. Residents of the controlled environment, such as inmates,use such devices to communicate with parties outside of the controlledenvironment, to connect with the Internet, or to consume content, toname a few examples of device usage. Controlled environments implementstrict rules and policies governing how these devices are to be used andtypically will approve any devices that may be used by, for example,providing residents with pre-approved devices that have been customizedto comply with the strict rules and policies or installing managementsoftware on such devices that restrict or allow specific approvedactions.

In order to avoid compliance, residents smuggle in contraband (e.g.,unapproved) devices into the controlled environment which allow theresidents to perform unapproved and unauthorized activities such ascommunicating with unauthorized outside parties, downloadingunauthorized content, and/or browsing unauthorized websites. Currentmethods for detecting these contraband devices are cumbersome and arenot effective in preventing their usage while within the controlledenvironment.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a diagram of an exemplary contraband detectionsystem, according to embodiments of the present disclosure.

FIG. 2 illustrates a block diagram of an exemplary smart power adapterfor use in the exemplary contraband detection system of FIG. 1 ,according to embodiments of the present disclosure.

FIG. 3 illustrates a block diagram of an exemplary smart power outletfor use in the exemplary contraband detection system of FIG. 1 ,according to embodiments of the present disclosure.

FIG. 4 illustrates a block diagram of an exemplary monitoring center foruse in the exemplary contraband detection system of FIG. 1 , accordingto embodiments of the present disclosure.

FIG. 5 illustrates a flowchart diagram of an exemplary method forcontraband detection by a smart power adapter in the exemplarycontraband detection system of FIG. 1 , according to embodiments of thepresent disclosure.

FIG. 6 illustrates a flowchart diagram of an exemplary method forcontraband detection by a smart outlet in the exemplary contrabanddetection system of FIG. 1 , according to embodiments of the presentdisclosure.

FIG. 7 illustrates a flowchart diagram of an exemplary method forcontraband detection by a monitoring center in the exemplary contrabanddetection system of FIG. 1 , according to embodiments of the presentdisclosure.

FIG. 8 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

Accordingly, there is a need for contraband detection and preventionwithin a controlled environment. Embodiments of this disclosure providea method and devices for detecting contraband devices and preventingsuch devices from receiving power from any power adapter and/or outletwithin the controlled environment. In some embodiments, detection ofcontraband devices may also result in transmission of an alert messageindicating the presence and/or location of the detected contrabanddevices to appropriate administrators, such as a monitoring center, ofthe controlled environment.

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the disclosure. Rather, the scope ofthe disclosure is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact result from computing devices,processors, controllers, or other devices executing the firmware,software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the disclosure that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or customize for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such modifications are intended tobe within the meaning and plurality of equivalents of the exemplaryembodiments based upon the teaching and guidance presented herein. It isto be understood that the phraseology or terminology herein is for thepurpose of description and not of limitation, such that the terminologyor phraseology of the present specification is to be interpreted bythose skilled in relevant art(s) in light of the teachings herein.

Exemplary Contraband Detection System

FIG. 1 illustrates a diagram of an exemplary contraband detection system100, according to embodiments of the present disclosure. In someembodiments, contraband detection system 100 is deployed within acontrolled environment such as a prison where enforcement of rules andpolicies associated with device usage is necessary. A contraband deviceis any device that is not authorized for use or is authorized for onlylimited use (e.g., only allowed to receive power from certain outlets orcan only receive power during specific periods of the day) within thecontrolled environment. In some embodiments, contraband detection system100 includes a device 110 that is to be powered within the controlledenvironment and power cable 112 that, in some embodiments, includes USBconnector 114 and, in some embodiments, includes a smart power adapter116, a smart outlet 120 that, in some embodiments, includes electricaloutlet 122 and USB connector 124, and connection 126 between smartoutlet 120 and monitoring center 130. Only one device 110, one powercable 112, one smart outlet 120, and one monitoring center 130 aredepicted in FIG. 1 for simplicity. It is understood that contrabanddetection system 100 may include more than one of device 110, one powercable 112, one smart outlet 120, and one monitoring center 130.

In some embodiments, device 110 is a mobile device that is implementedas a smartphone. Other types of devices are within the scope of theinvention for device 110 such as cellular phones, tablets, laptops, andwearable devices and contraband detection system 100 includes more thanone device 110 that is depicted in FIG. 1 . In some embodiments, device110 is an electronic device that requires charging from an electricaloutlet and that has been smuggled into a controlled environment, such asa prison. In some embodiments, device 110 includes components installedby the controlled environment that allow for the management and controlof device 110. Examples of components include but are not limited tospecialized software that communicates information through power cable112 when device 110 is connected to power cable 112. In someembodiments, the specialized software is an application that responds toqueries from smart power adapter 116, smart outlet 120, and/ormonitoring center 130. Responses to these queries include informationassociated with device 110. For example, the information includes but isnot limited identification information that uniquely identifies device110 such as a randomly generated identifier or an identifier assigned todevice 110 and/or a user (e.g., an inmate) of device 110.

In embodiments involving a controlled environment, monitoring center 130automatically downloads the specialized software onto device 110. Insome embodiments, the controlled environment conditions usage of device110 within the controlled environment on the installation of thesoftware. In some embodiments, in addition to generating and/orproviding unique identification information associated with device 110,the specialized software also allows the controlled environment tootherwise manage and control operations of device 110 such asdetermining whether device 110 is authorized to receive power throughany adapters or outlets within the controlled environment, such as smartpower adapter 116 and smart outlet 120, respectively. Accordingly,contraband devices will not include such specialized software and willnot be able to respond to any queries or otherwise provide an identifierto smart power adapter 116, smart outlet 120, and/or monitoring center130. In some embodiments, the absence of an appropriate response to aquery (which may be transmitted from smart power adapter 116, smartoutlet 120, and/or monitoring center 130) is an indication that device110 is not authorized to receive power.

In some embodiments, power cable 112 includes at least one mechanism forconnecting to smart outlet 120 such as USB connector 114 and smart poweradapter 116. In some embodiments, smart power adapter 116 includescontraband detection components for determining whether device 110 isauthorized to receive power from an outlet within the controlledenvironment, such as smart outlet 120. In some embodiments, within acontrolled environment, authorization for receiving power is determinedby comparing identification information received from device 110 with alist of authorized identifiers associated with devices that have beenapproved (e.g., by monitoring center 130) to receive power through anoutlet within the controlled environment (e.g., smart outlet 120). Insome embodiments, authorization for receiving power includes the step oftransmitting the identification information to smart outlet 120 and/ormonitoring center 130 and receiving a contraband response from smartoutlet 120 and/or monitoring center 130. In some embodiments, thecontraband response indicates whether device 110 is authorized toreceive power within the controlled environment. Smart power adapter 116includes external prongs for connecting to electrical receptacles ofsmart outlet 120.

In some embodiments, power cable 112 is capable of receiving power forcharging a battery and/or otherwise powering device 110 as well astransmitting data from device 110 to an external device such as smartpower adapter 116, smart outlet 120, and/or monitoring center 130, andvice versa. Examples of data that can be transmitted through power cable112 include but are not limited to device identification information,queries for such identification information, acknowledgement messages(ACKs), and negative acknowledgement messages (NACKs).

In some embodiments, smart outlet 120 includes USB connector 124 forreceiving USB connector 114 attached to power cable 112 and electricaloutlet 122 for receiving smart power adapter 116 attached to powercable. In some embodiments, smart outlet 120 also includes contrabanddetection components for determining whether device 110 is authorized toreceive power from smart outlet 120. In some embodiments, authorizationfor receiving power includes the step of transmitting the identificationinformation to monitoring center 130 and receiving a contraband responsemonitoring center 130. In some embodiments, the contraband responseindicates whether device 110 is authorized to receive power within thecontrolled environment. Smart power adapter 116 includes external prongsfor connecting to electrical receptacles of smart outlet 120.

In some embodiments, connection 126 between smart outlet 120 andmonitoring center 130 is capable of transmitting signaling informationin conjunction with power between smart outlet 120 and monitoring center130. Although only one connection is shown with respect to connection126, it is understood that, in some embodiments, connection 126comprises more than one connection between smart outlet 120 andmonitoring center 130. For example, connection 126 comprises anelectrical connection for relaying power as well as a wirelessconnection such as cellular (e.g., GSM, CDMA), Bluetooth or IEEE 802.11(commonly known as Wi-Fi). Accordingly, smart outlet 120 communicateswith monitoring center 130 over wired (e.g., electrical wiring) and/orwireless (e.g., Wi-Fi) communications.

In some embodiments, monitoring center 130 is associated with acontrolled environment and, in some embodiments, coordinates with smartpower adapter 116 and/or smart outlet 120 to ensure that device 110 isauthorized to receive power while located within the controlledenvironment. In some embodiments, monitoring center 130 includescontraband detection components that allow monitoring center 130 todetermine whether a device (e.g., device 110) is authorized to receivepower from any outlet while the device is within the controlledenvironment. In some embodiments, monitoring center 130 also storesdevice profiles associated with devices that are allowed to receivepower while located in the controlled environment.

As previously noted, contraband detection includes determining whetherdevices are authorized to receive power while the devices are locatedwithin the controlled environment. In some embodiments, determiningwhether devices are authorized includes performing a comparison ofidentification information associated with the devices with a list ofauthorized devices that identifies devices that have been approved(e.g., by administrators of the controlled environment, by monitoringcenter 130) for general operation including receiving power. Devicesthat attempt to receive power from any outlet, such as smart outlet 120,that are not authorized to function within the controlled environmentwill be prevented from receiving power from outlets.

In some embodiments, the contraband detection is performed by device 110and smart components of contraband detection system: smart power adapter116, by smart outlet 120, by monitoring center 130, or by anycombination of these devices. In other words, contraband detection ispossible as long as at least one smart power component within contrabanddetection system 100 is capable of detecting whether device 110 is acontraband device. For example, in some embodiments, a controlledenvironment only includes smart outlets (e.g., outlets that includecontraband detection capability). In some embodiments, a controlledenvironment only includes smart power adapters and another controlledenvironment includes all a combination of all three. In suchembodiments, contraband detection of devices is possible through anycombination of these smart components as long as power to devices can becontrolled through the outlet (e.g., by activating or deactivating thepower components such as smart power adapter 116 and/or smart outlet120).

When device 110 connects to any one of smart power adapter 116 or smartoutlet 120, the transmission of the device identification informationessentially acts as a request for power to be provisioned to device 110.Any one of smart power adapter 116, smart outlet 300, and/or monitoringcenter 130 determines whether device 110 is authorized to receive powerby detecting whether device 110 is a contraband device. In someembodiments, contraband device also includes a device that is beingutilized a user that is not authorized to utilize the device.

Exemplary Smart Power Adapter

FIG. 2 illustrates a block diagram of an exemplary smart power adapter200 for use in the exemplary contraband detection system of FIG. 1 ,according to embodiments of the present disclosure. In some embodiments,smart power adapter 200 represents an exemplary embodiment of smartpower adapter 116 as described in FIG. 1 . In some embodiments, smartpower adapter 200 includes power management module 202, contrabandmodule 204, processor circuitry 206, memory 208, and communicationmodule 210.

In some embodiments, power management module 202 is a component thatmanages the relay of power through smart power adapter 200 from anoutlet such as smart outlet 120. In some embodiments, power managementmodule 202 receives commands from processor circuitry 206, contrabandmodule 204, and/or communication module 210 to allow for or preventpower to be relayed through smart power adapter 200.

In some embodiments, contraband module 204 is a component that performscontraband detection for any device, such as device 110 that connects tosmart power adapter 200 and determines whether power should be relayedthrough smart power adapter 200. For example, when device 110 isconnected to smart power adapter 200, such as by connecting power cable112 to device 110, contraband module 204 receives identificationinformation associated with the device 110 through power cable 112. Insome embodiments, the identification information is transmittedautomatically to contraband module 204 by a software application indevice 110 (e.g., upon connecting device 110 and power cable 112). Insome embodiments, the identification is transmitted by the softwareapplication in device 110 in response to a query from contraband module204.

In some embodiments, contraband module 204 determines whether device 110is authorized to receive power through any outlet based on the receivedidentification information. In some embodiments, this determination isperformed by contraband module 204. In some embodiments, smart poweradapter 200 does not perform contraband detection (e.g., contrabandmodule 204 is absent or not working) and forwards the identificationinformation to another smart power component for contraband detectionsuch as a smart outlet, such as smart outlet 120, or to a monitoringcenter, such as monitoring center 130, associated with the controlledenvironment.

In some embodiments, contraband module 204 also determines whether powershould be relayed through smart power adapter 200 based on detecting theuser of device 110 and confirming that the detected user is approved forutilizing device 110 and/or any device within the controlled environment(e.g., the controlled environment may include blacklists of inmates thatare not allowed to utilize devices). Contraband module 204 communicateswith device 110 to query the user for the user's identificationinformation, such as biometric data including the user's facial data,fingerprint data, and/or voice data. For example, contraband module 204causes a camera on device 110 to activate and automatically captures animage of the current user of device 110. Contraband module 204 thenforwards this image data to smart outlet 120 or monitoring center 130for determining whether the detected user is authorized to use device110 and/or authorized to user any wireless device. In some embodiments,contraband module 204 will receive a message indicating that the user isauthorized or not authorized and based on this message, contrabandmodule 204 will either allow or prevent power from being relayed todevice 110.

Processor circuitry 206 includes one or more processors. Processorscontrol the operation of smart power adapter 200 and its components. Insome embodiments, memory 208 can be any well-known volatile and/ornon-volatile memory that is removable and/or non-removable. Memory 208can store a list of authorized identifiers associated with devices thathave been approved for usage within the controlled environment. In someembodiments, smart power adapter 200 receives the lists of authorizeddevices (and updates) from smart outlet 120 and/or monitoring center 130such as through communication module 210. In some embodiments, memory208 also stores a unique identifier that identifies smart power adapter200 within the controlled environment. In some embodiments, each smartpower adapter 200 within the controlled environment stores a uniqueidentifier that allows monitoring center 130 to identify and/or locatesmart power adapters within the controlled environment. For example,monitoring center 130 can utilize the unique identifiers for each smartpower adapter 200 to determine to which smart outlet 120 the adaptersare connected. In some embodiments, memory 208 also stores a history ofdevices that have been connected to smart power adapter 200. The historyof devices includes any of device identification information of thedevices, a period of time that each device was connected to smart poweradapter 200, and outlet identification information of any outlets towhich smart power adapter 200 has been connected.

In some embodiments, communication module 210 includes one or moretransceivers, transmitters, and/or receivers that manage and communicatedata to device 110, smart outlet 120, and/or monitoring center 130. Insome embodiments, communication module 210 transmits data such asqueries from smart outlet 120 and/or monitoring center 130 to device110. If smart outlet 120 communicates over an electrical connection withmonitoring center 130, then the data is in the form of electricalsignals that are superimposed on the power wave that is traditionallytransmitted over the electrical connection. For example, data that isintended to be received by device 110 can be transmitted at a differentfrequency than electrical waves to ensure that the data signal does notinterfere with the power wave. In some embodiments, communication module210 translates data signals received from smart outlet 120 andmonitoring center 130 into appropriate signals that can be understoodand processed by device 110. In some embodiments, such signals areaddressed to the specialized software that is installed on device 110.

In some embodiments, communication module 210 also includes a wirelessinterface, such as Wi-Fi interface, cellular interface, and Bluetoothinterface. Wi-Fi interface includes a Wi-Fi transceiver that enablesWi-Fi communication between smart power adapter 200 and an externaldevice that also has Wi-Fi capability such as devices in controlledenvironment. Cellular interface which includes a cellular transceiverthat enables cellular communication between smart power adapter 200 andan external device that has cellular capability such as cellularantenna. Bluetooth interface includes a Bluetooth transceiver thatenables Bluetooth communication between smart power adapter 200 and anexternal device that also has Bluetooth capability.

Communication module 210 also communicates with associated monitoringcenters of controlled environments, such as monitoring center 130.Communication module 210 allows monitoring center 130 to manage andotherwise control operations of smart power adapter 200 either throughthe powerline network associated with a smart outlet or through wirelesscommunications. For example, communication module 210 responds toqueries from monitoring center 130 with a unique identifier (e.g.,retrieved from memory 208) and transmits responses to monitoring center130. As another example, communication module 210 communicates statusinformation regarding operations (e.g., stored in memory 208) of smartpower adapter 200 to monitoring center 130.

Exemplary Smart Outlet

FIG. 3 illustrates a block diagram of an exemplary smart outlet 300 foruse in the exemplary contraband detection system of FIG. 1 , accordingto embodiments of the present disclosure. In some embodiments, smartoutlet 300 represents an exemplary embodiment of smart outlet 120 asdescribed in FIG. 1 . Smart outlet 300 controls power to externaldevices and transmits data to and from external devices, to and frommonitoring centers associated with a controlled environment in whichsmart outlet 300 is installed, and between external devices andmonitoring centers. In some embodiments, smart outlet 300 includes powermanagement module 302, processor circuitry 304, memory 306, datamanagement module 308, communication module 310 that includes powerlinemodule 312 and network module 314, and contraband module 316.

In some embodiments, power management module 302 is a component thatmanages the relay of power through smart outlet 300 to a connectedexternal device such as device 110. In some embodiments, device 110 isconnected to smart outlet 300 through a power adapter, such as smartpower adapter 200. In some embodiments, power management module 302receives commands from processor circuitry 304, communication module310, and contraband module 316 to allow for or prevent power to berelayed through smart outlet 300.

Processor circuitry 304 includes one or more processors. Processorscontrol the operation of smart outlet 300 and its components. In someembodiments, memory 306 can be any well-known volatile and/ornon-volatile memory that is removable and/or non-removable. Memory 306can store a list of authorized identifiers associated with devices thathave been approved for usage within the controlled environment andidentification information associated with all residents of thecontrolled environment in which smart outlet 300 is installed. In someembodiments, smart outlet 300 receives lists of authorized devices (andupdates) from monitoring center 130 such as through communication module310. In some embodiments, each smart outlet 300 within the controlledenvironment stores a unique identifier that allows monitoring center 130to identify and/or locate smart outlets within the controlledenvironment. For example, monitoring center 130 can utilize the uniqueidentifiers for each smart power adapter 200 to determine to which smartoutlet 300 the adapters are connected. In some embodiments, memory 306also stores rules associated with the relaying of power through smartoutlet 300. For example, rules can include but are not limited tocontrolling hours in which power may be relayed through smart outlet,default state of smart outlet 300, and a maximum duration of a sessionin which power can be relayed to a connected external device. Thedefault state of smart outlet 300 refers to whether smart outlet isinactive (e.g., does not relay power by default) or active (e.g., aregular outlet that relays power by default). Rules are either pushed tomemory 306 or pulled, such as through a request from data managementmodule 308. In some embodiments, memory 306 also stores profileinformation of devices and/or inmates of the controlled environment inwhich smart outlet 300 is installed. Profile information includesinformation as to whether an inmate is approved for utilizing certainexternal devices, which devices are approved for receiving power throughsmart outlets in the controlled environment, and which smart outlets areapproved for provisioning power to an inmate or device (e.g., a deviceor an inmate can be approved to connect to only certain smart outletssuch as in their cells or in common areas).

In some embodiments, data management module 308 manages data that istransmitted through smart outlet 300, such as between smart poweradapter 200 and monitoring center 130. Functions of data managementinclude receiving data that is transmitted by devices connected to smartoutlet 300 such as device 110, smart power adapter 200, and monitoringcenter 130. Examples of data include device identification data, useridentification data, smart power adapter identification data, smartoutlet identification data, history information regarding externaldevices (e.g., devices, smart power adapters) that were previouslyconnected to smart outlet 300, and status information regarding theexternal devices (e.g., how long each external device was connected tosmart outlet 300). In some embodiments, data management module 308 alsomanages any rules and profiles associated with external devices, such asdevice 110 and/or smart power adapter 200, and registered users ofcontraband detection system 100, such as residents of controlledenvironment. For example, data management module 308 manages updatesand/or modifications to these rules and profiles that are either pushedor pulled to smart outlet 300.

In some embodiments, communication module 310 includes one or moretransceivers, transmitters, and/or receivers that communicate datatransmitted and received by smart outlet 300. For example, communicationmodule 310 includes powerline module 312 for communicating and receivingdata over electrical connections and network module 314. Data istransmitted to and/or received from any of external devices, such asdevice 110, smart power adapter 200, and/or monitoring center 130. Insome embodiments, communication module 310 receives data such asprofiles and rules from monitoring center 130. Other examples includereceiving queries from monitoring center 130 and transmitting queries todevice 110. As previously described, in some embodiments, smart outlet300 communicates over an electrical connection with monitoring center130 and data is transmitted in the form of electrical signals that aresuperimposed on the power wave that is traditionally transmitted overthe electrical connection. Such a transmission is accomplished throughpowerline module 312.

In some embodiments, communication module 310 also includes networkmodule 314 such as a Wi-Fi interface, cellular interface, and Bluetoothinterface. Wi-Fi interface includes a Wi-Fi transceiver that enablesWi-Fi communication between smart outlet 300 and an external device thatalso has Wi-Fi capability such as devices in controlled environment.Cellular interface which includes a cellular transceiver that enablescellular communication between smart outlet 300 and an external devicethat has cellular capability such as cellular antenna. Bluetoothinterface includes a Bluetooth transceiver that enables Bluetoothcommunication between smart outlet 300 and an external device that alsohas Bluetooth capability.

Communication module 310 also communicates with associated monitoringcenters of controlled environments, such as monitoring center 130.Communication module 310 allows monitoring center 130 to manage andotherwise control operations of smart outlet 300 either through thepowerline network associated with a smart outlet (e.g., throughpowerline module 312) or through wireless communications (e.g., networkmodule 314). For example, communication module 310 responds to queriesfrom monitoring center 130 with a unique identifier of smart outlet 300(e.g., retrieved from memory 306) and transmits responses to monitoringcenter 130. As another example, communication module 310 communicatesstatus information regarding operations (e.g., stored in memory 306) ofsmart power adapter 200 to monitoring center 130.

In some embodiments, contraband module 316 is a component that performscontraband detection for any device, such as device 110 that connects tosmart outlet 300 through a power adapter such as smart power adapter200. However, connections between device 110 and smart outlet 300 do notneed to be through a smart power adapter 200 if smart outlet 300 ormonitoring center 400 (discussed further below) includes capabilitiesfor detecting contraband devices. In other words, contraband detectionwithin contraband detection system 100 is not dependent on allcomponents including contraband detection capability. As long as atleast one component (e.g., smart power adapter 200, smart outlet 300,and monitoring center 130) includes capabilities for detectingcontraband devices (e.g., by performing device identificationauthentication), contraband detection system 100 will be capable ofdetecting contraband devices within a controlled environment.

In some embodiments, when device 110 is connected to an adapter, such asby connecting power cable 112 to device 110, contraband module 316receives identification information associated with the device 110through power cable 112 and the adapter. As noted above, in someembodiments, adapter is implemented as a conventional adapter and insome embodiments, adapter is implemented as a smart power adapter, suchas smart power adapter 200. In embodiments where adapter is a smartadapter, contraband module 316 receives identification of the smartadapter. In some embodiments, the identification information (of device110, of smart power adapter 200 or both) is transmitted automatically tocontraband module 316. In some embodiments, device identificationinformation is transmitted by a software application in device 110(e.g., upon connecting device 110 and power cable 112). In someembodiments, the identification is transmitted by the softwareapplication in device 110 in response to a query from contraband module204. In some embodiments, adapter identification information istransmitted by communication module 210 of smart power adapter 200.

In some embodiments, contraband module 316 determines whether device 110is authorized to receive power through any outlet based on the receivedidentification information. In some embodiments, this determination isperformed by contraband module 316. In some embodiments, smart outlet300 does not perform contraband detection (e.g., contraband module 316is absent or not working) and forwards the identification information toanother smart power component for contraband detection such as amonitoring center, such as monitoring center 130, associated with thecontrolled environment. In some embodiments, smart power adapter 200performs the contraband detection and transmits a signal to contrabandmodule 316 indicating whether the device connected to smart poweradapter 200 is authorized to receive power. In response to this signal,contraband module 316 changes its power state to active or inactivebased on whether the device is authorized to receive power.

In some embodiments, contraband module 316 also determines whether powershould be relayed through smart outlet 300 based on detecting the userof device 110 and confirming that the detected user is approved forutilizing device 110 and/or any device within the controlled environment(e.g., the controlled environment may include blacklists of inmates thatare not allowed to utilize devices). Contraband module 316 communicateswith device 110 to query the user for the user's identificationinformation, such as biometric data including the user's facial data,fingerprint data, and/or voice data. For example, contraband module 316causes a camera on device 110 to activate and automatically captures animage of the current user of device 110. Contraband module 316 thenprocesses the image data and compares it with inmate data stored insmart outlet 300 and/or forwards this image data to monitoring center130 for determining whether the detected user is authorized to usedevice 110 and/or authorized to user any wireless device. In embodimentswhen the user data is transmitted to monitoring center 130, contrabandmodule 316 will receive a message from monitoring center 130 indicatingthat the user is authorized or not authorized and based on this message,contraband module 316 will either allow or prevent power from beingrelayed to device 110.

Exemplary Monitoring Center

FIG. 4 illustrates a block diagram of an exemplary monitoring center 400for use in the exemplary contraband detection system of FIG. 1 ,according to embodiments of the present disclosure. In some embodiments,monitoring center 400 represents an exemplary embodiment of monitoringcenter 130 as described in FIG. 1 . In some embodiments, monitoringcenter 400 is implemented as a single device, multiple devices or acloud-based device. Monitoring center 400 is associated with thecontrolled environment and monitors status and operations of powerdelivery through smart outlets and smart adapters in the controlledenvironment. In some embodiments, monitoring center 400 includesprocessor circuitry, memory 404, communication module 406 that includespowerline module 408 and network module 410, device profiles 412,contraband module 414, and power management module 416.

Processor circuitry 402 includes one or more processors. Processorscontrol the operation of monitoring center 400 and its components. Insome embodiments, memory 404 can be any well-known volatile and/ornon-volatile memory that is removable and/or non-removable. Memory 404can store information needed to control and manage operations ofcontraband detection system 100. Information includes but is not listedto a list of authorized identifiers associated with devices that havebeen approved for usage within the controlled environment,identification information associated with all residents of thecontrolled environment, profiles of residents of the controlledenvironment, profiles of devices of the controlled environment, rulesassociated with devices, rules associated with smart outlets, rulesassociated with residents, and rules associated with smart poweroutlets. Rules relate to conditions in which power is to be provided ordenied to by smart outlets and/or adapters to specific devices and/orresidents within the controlled environment. Profiles includeinformation regarding each of the smart outlets, smart power adapters,specific devices, and/or residents within the controlled environmentthat provide information utilized by the rules to determine whetherpower should be provided or denied.

Examples of information stored in smart outlet profiles include, but arenot limited to, identification information that uniquely identifies thesmart outlet within the controlled environment, information as to thesmart outlet's location within the controlled environment, and historyinformation as to which devices and/or residents have been previouslyconnected to the smart outlet. Examples of rules associated with smartoutlets include, but are not limited to, power provisioning based onsmart power adapter identifiers, device identifiers, user identifiers,and/or time restrictions.

Examples of information stored in smart power adapter profiles include,but are not limited to, identification information that uniquelyidentifies the smart power adapter within the controlled environment andhistory information as to which smart outlets, which devices, and whichresidents have been associated with the smart power adapter. Examples ofrules associated with smart power adapters include but are not limitedto, power provisioning based on smart outlet identifiers, deviceidentifiers, user identifiers, and/or time restrictions.

In some embodiments, communication module 406 includes one or moretransceivers, transmitters, and/or receivers that communicate datatransmitted and received by monitoring center 400. For example,communication module 406 includes powerline module 408 for communicatingand receiving data over electrical connections and network module 410.Data is transmitted to and/or received from any of external devices,such as device 110, smart power adapter 200, and/or smart outlet 300. Insome embodiments, communication module 406 transmits data such asprofiles and rules to smart power adapter 200 and/or smart outlet 300.Examples of such transmissions include but are not limited totransmitting lists of authorized devices (and updates) to smart poweradapter 200 and/or smart outlet 300, rules for any of devices, such asdevice 110, residents, smart adapters, such as smart power adapter 200,and smart outlets, such as smart outlet 300. In some embodiments,monitoring center 130 identifies and/or locates smart outlets or poweradapters within the controlled environment based a unique identifierassociated with each smart outlet and power adapter. For example,monitoring center 130 utilizes the unique identifiers for each smartpower adapter 200 and/or smart outlet 300 to determine to which smartoutlet 300 the smart power adapter is connected.

In some embodiments, communication module 406 also includes networkmodule 410 such as a Wi-Fi interface, cellular interface, and Bluetoothinterface. Wi-Fi interface includes a Wi-Fi transceiver that enablesWi-Fi communication between monitoring center 400 and an external devicethat also has Wi-Fi capability such as devices in controlledenvironment. Cellular interface which includes a cellular transceiverthat enables cellular communication between monitoring center 400 and anexternal device that has cellular capability such as cellular antenna.Bluetooth interface includes a Bluetooth transceiver that enablesBluetooth communication between monitoring center and an external devicethat also has Bluetooth capability.

In some embodiments, contraband module 414 is a component that performscontraband detection for any device, such as device 110 that connects tosmart outlet 300 through a power adapter such as smart power adapter200. In some embodiments, contraband module 414 will perform contrabanddetection of devices when smart power adapter 200 and/or smart outlet300 are not capable of performing the contraband detection. In suchembodiments, necessary information to perform contraband detection, suchas device identification information and additional information such asidentification information associated with smart power adapter 200and/or smart outlet 300 are transmitted to monitoring center 400. Asnoted above, only one component within contraband detection system 100needs to include contraband detection capability within their respectivecontraband module. Accordingly, as long as at least one component (e.g.,smart power adapter 200, smart outlet 300, and monitoring center 130)includes capabilities for detecting contraband devices (e.g., byperforming device identification authentication), contraband detectionsystem 100 will be capable of detecting contraband devices within acontrolled environment.

In some embodiments, when device 110 is connected to an adapter, such asby connecting power cable 112 to device 110 and an outlet, such as smartoutlet 300, contraband module 414 receives identification informationassociated with the device 110 through power cable 112 and the adapter.Other types of identification information include but are not limited tosmart outlet and smart power adapter identification information. In someembodiments, the adapter is implemented as a conventional adapter andthe outlet is implemented as a conventional outlet. In some embodiments,the adapter is implemented as a smart power adapter, such as smart poweradapter 200, and the outlet is implemented as a smart outlet, such assmart outlet 300. In embodiments where adapter is a smart power adapterand/or outlet is a smart outlet, contraband module 414 receivesidentification of the smart power adapter 200 and/or smart outlet 300.In some embodiments, the identification information (of device 110, ofsmart power adapter 200 or both) is transmitted automatically tocontraband module 414. In some embodiments, device identificationinformation is transmitted by a software application in device 110(e.g., upon connecting device 110 and power cable 112). In someembodiments, the identification is transmitted by the softwareapplication in device 110 in response to a query from contraband module204. Adapter identification information is transmitted by communicationmodule 210 of smart power adapter 200 and outlet identificationinformation is transmitted by communication module 310 of smart outlet300.

In some embodiments, contraband module 414 determines whether device 110is authorized to receive power based on the received identificationinformation. This determination is based on at least one the deviceidentification information, smart power identification information,smart outlet identification information and retrieving the appropriaterules and profiles associated with the received identificationinformation that indicate whether device 110 is authorized to receivepower. For example, contraband module 414 determines, based on anassociated rule(s) and profile(s) that device 110 is authorized toreceive power from an outlet in the cell of the inmate but no otheroutlets. Accordingly, contraband module 414 determines whether device110 is connected to the appropriate outlet, and if so, transmits asignal that device 110 is approved to receive power. In response to thisdetermination, contraband module 414 transmits a signal to the outlet towhich device 110 is connected. In some embodiments, the signal causesthe outlet to change its power state to active or inactive based onwhether the device is authorized to receive power.

In some embodiments, contraband module 414 also determines whether powershould be relayed through smart outlet 300 based on detecting the userof device 110 and confirming that the detected user is approved forutilizing device 110 and/or any device within the controlled environment(e.g., the controlled environment may include blacklists of inmates thatare not allowed to utilize devices). Contraband module 414 communicateswith device 110, smart outlet 300, and/or smart power adapter 200 toquery the user for the user's identification information, such asbiometric data including the user's facial data, fingerprint data,and/or voice data.

In some embodiments, power management module 416 is a component thatallows monitoring center 400 to control the provisioning of power by anysmart outlet to which monitoring center 400 has an electrical or networkconnection. In some embodiments, power management module 416 transmitscommands to smart outlets and smart power adapters such as commands toactivate or deactivate them.

Exemplary Smart Power Connection Operation

Exemplary usage of contraband detection system 100 will be describedwith respect to FIGS. 5-7 . The exemplary usage described in FIGS. 5-7can be performed by processing logic that can comprise hardware (e.g.,circuitry, dedicated logic, programmable logic, microcode, etc.),software (e.g., instructions executing on a processing device), or acombination thereof. For illustrative purposes, FIGS. 5-7 are describedwith respect to FIGS. 1-4 but are not limited to these exampleembodiments. The methods described in FIGS. 5-7 can be performed byprocessing logic that can comprise hardware (e.g., circuitry, dedicatedlogic, programmable logic, microcode, etc.), software (e.g.,instructions executing on a processing device), or a combinationthereof. It is to be appreciated that additional steps, such asadditional object recognition steps, may be performed. Moreover, not allsteps may be needed to perform the disclosure provided herein. Further,some of the steps may be performed simultaneously, or in a differentorder than shown in FIGS. 5-7 , as will be understood by a person ofordinary skill in the art. Additionally, some steps can be combined withsteps of methods from other figures and performed as a single step.

FIG. 5 illustrates a flowchart diagram of an exemplary method 500 forperforming contraband detection by a smart power adapter in an exemplarycontraband detection system 100 of FIG. 1 , according to someembodiments of the present disclosure. In some embodiments, method 500can be performed by smart power adapter 200.

In 502, smart power adapter 200 detects that a connection has beenestablished with a device, such as device 110. In some embodiments, thisconnection is through a power cable, such as power cable 112. In someembodiments, this detection is performed automatically upon connectingpower cable 112 to device 110 (e.g., through a USB connection betweenpower cable 112 and device 110). In some embodiments, this detecting isperformed in response to a query that is transmitted by contrabandmodule 204 of smart power adapter 200.

In 504, smart power adapter 200 receives device information, such asidentification information that uniquely identifies device 110, fromdevice 110. In some embodiments, the device information is provided bycustomized software installed on device 110 by controlled environmentand includes a device identifier associated with device 110. In someembodiments, the device information also includes profile informationthat is stored on a secure area of device 110 and this profileinformation includes but is not limited profiles associated with theuser of device 110 and or a device profile associated with device 110.

In 506, smart power adapter 200 determines whether it is capable ofperforming contraband detection of device 110. In some embodiments,determination of capability is based on whether smart power adapter 200includes contraband module 204 and/or if contraband module 204 isoperating properly. If smart power adapter 200 is capable of determiningwhether device 110 is contraband based on the received deviceinformation, in 508, contraband module 204 performs contraband detectionas described in some embodiments above. For example, contrabanddetection includes determining, based on the received deviceinformation, whether device 110 is authorized by controlled environmentto receive power while within the controlled environment. In someembodiments, this determination is based on comparing the deviceidentifier with a list of identifiers authorized by the controlledenvironment for receiving power.

In 510, if smart power adapter 200 is not capable of performingcontraband detection, then smart power adapter 200 transmits the deviceinformation to the connected outlet, which may or may not be implementedas a smart outlet. In 512, smart power adapter 200 receives a responsefrom the outlet which indicates whether device 110 is contraband. In514, smart power adapter 200 determines whether device 110 is contrabandbased on the performed contraband detection.

In 516, if device 110 is not determined to be a contraband device, thensmart power adapter 200 begins provisioning power to device 110. In someembodiments, provisioning power includes activating smart power adapter200 and/or the outlet from an inactive state to an active state. In someembodiments, the default state of smart power components (e.g., smartpower adapter 200, smart outlet 300) within contraband detection system100 is inactive which means that they are not capable of relaying powerto connected devices. When activated, smart power components becomecapable of relaying power to device 110. In 518, if device 110 isdetermined to be a contraband device, then smart power adapter 200 doesnot provision power (e.g., remains in an inactive state) and sends analert to monitoring center. In some embodiments, the alert indicates theattempted request for power, reason(s) why the request was denied, andany information with respect to device 110, smart power adapter 200, andthe outlet to which these components attempted to receive power.

FIG. 6 illustrates a flowchart diagram of an exemplary method 600 forperforming contraband detection by a smart outlet within an exemplarycontraband detection system 100 of FIG. 1 , according to embodiments ofthe present disclosure. In some embodiments, method 600 can be performedby smart outlet 300.

In 602, smart outlet 300 detects that a connection has been establishedbetween smart outlet 300 and an external device including at least oneof device 110 and a power adapter such as smart power adapter 200. Insome embodiments, the power adapter is a conventional adapter and smartoutlet 300 only detects connection with device 110 because aconventional adapter does not necessarily include, for example, memoryfor storing identification information regarding the adapter. In someembodiments, this detection (either from device 110, the power adapter,or both) is performed automatically upon connecting the power adapter(e.g., through a USB connection between power cable 112 and device 110)to smart outlet 300. In some embodiments, connecting only the poweradapter (e.g., without a device 110 connected to the power adapter) doesnot result in a request for power since there are no devices thatrequire power connected to the power adapter. In other words, a requestfor power is transmitted upon the connection of device 110, a poweradapter (either smart power adapter 200 or a conventional power adapter)to smart outlet 300. In some embodiments, this detecting is performed inresponse to a query that is transmitted by contraband module 316 ofsmart outlet 300.

In 604, smart outlet 300 determines whether it has receivedidentification information, such as device identification informationthat uniquely identifies device 110, from device 110 and/or adapteridentification information that uniquely identifies the power adapter(if the power adapter is implemented as smart power adapter 200 thatincludes stored identification information). In some embodiments, thedevice identification information is provided by customized softwareinstalled on device 110 by controlled environment and includes a deviceidentifier associated with device 110. In some embodiments, the deviceidentification information also includes profile information that isstored on a secure area of device 110 and this profile informationincludes but is not limited profiles associated with the user of device110 and or a device profile associated with device 110.

In 606, if no identification information is received (e.g., poweradapter has not transmitted any device identification information oradapter identification information), smart outlet 300 next determineswhether it has received a contraband signal from the power adapter. Insome embodiments, the power adapter transmits a contraband signal tosmart outlet 300 if the power adapter is capable of performingcontraband detection. The contraband signal indicates the results of thepower adapter's contraband detection such as whether device 110 ispermitted or restricted from receiving power from smart outlet 300.

If smart outlet 300 does not receive identification information or thecontraband signal, in 608, then smart outlet 300 queries device 110 fordevice identification information. In some embodiments, the query istransmitted to customized software installed on device 110 by thecontrolled environment. In some embodiments, the query is tailored suchthat it can only be responded to be the customized software. In someembodiments, the controlled environment will install the customizedsoftware on devices that have been approved for use and for receivingpower within controlled environment. In other words, in someembodiments, contraband devices generally will not have customizedsoftware installed on them and therefore will not be able to respond toqueries from smart outlet 300. In some embodiments, the query istransmitted to existing software on device 110 and requests uniqueidentification information that has been pre-stored on device 110 (e.g.,a MAC address).

In 610, smart outlet 300 receives device identification from device 110in response to the query.

In 612, smart outlet 300 determines whether it is capable of performingcontraband detection of device 110. In some embodiments, determinationof capability is based on whether smart outlet 300 includes contrabandmodule 316 and/or if contraband module 316 is operating properly. Ifsmart outlet 300 is capable of determining whether device 110 iscontraband based on the received device information, in 614, contrabandmodule 316 performs contraband detection as described in someembodiments above. For example, contraband detection includesdetermining, based on the received device information, whether device110 is authorized by the controlled environment to receive power whilewithin the controlled environment. In some embodiments, thisdetermination is based on comparing the device identifier with a list ofidentifiers authorized by the controlled environment for receivingpower. Other examples of contraband detection include but are notlimited determining whether device 110 is authorized to receive powerfrom only specific outlets within the controlled environment, whetherdevice 110 is authorized to be used by a specific resident of thecontrolled environment, and/or whether device 110 is authorized toreceive power during specific periods of the day.

In 616, if smart outlet 300 is not capable of performing contrabanddetection, then smart outlet 300 transmits the identificationinformation to the connected monitoring center, such as monitoringcenter 400. As noted above, smart outlet 300 is connected to monitoringcenter 400 through the electrical connections of the controlledenvironment and/or through network connections. Accordingly,transmission of the identification information is through a powerlinecommunication through the electrical connections of the controlledenvironment and/or transmitted through a network connection, such as aWi-Fi connection. In 618, smart outlet 300 receives a response from themonitoring center 400, the respond indicating whether device 110 iscontraband.

In 620, smart outlet 300 determines whether device 110 is contrabandbased on the performed contraband detection. In 622, if device 110 isnot determined to be a contraband device, then smart outlet 300 beginsprovisioning power to device 110. In some embodiments, provisioningpower includes activating smart outlet 300 from an inactive state to anactive state and/or activing smart power adapter 200 from an inactivestate to an active state. As previously noted, in some embodiments, thedefault state of smart power components (e.g., smart power adapter 200,smart outlet 300) within contraband detection system 100 is inactivewhich means that they are not capable of relaying power to connecteddevices. In 624, if device 110 is determined to be a contraband device,then smart outlet 300 does not provision power (e.g., remains in aninactive state) and sends an alert to monitoring center. In someembodiments, the alert indicates the attempted request for power,reason(s) why the request was denied, and any information with respectto device 110, smart power adapter 200, and smart outlet 300.

FIG. 7 illustrates a flowchart diagram of an exemplary method 700 forperforming contraband detection by a monitoring center within anexemplary contraband detection system 100 of FIG. 1 , according toembodiments of the present disclosure. In some embodiments, method 700can be performed by monitoring center 400.

In 702, monitoring center 400 receives identification informationassociated with device 110 from an outlet, which may be implemented as asmart outlet 300 or as a conventional outlet. As noted above, in someembodiments, monitoring center 400 is connected to outlets in thecontrolled environment through the controlled environment's electricalsystem and/or through a network connection. Accordingly, theidentification information is received as a powerline communicationthrough the electrical system and/or through a network connection suchas a Wi-Fi connection. In some embodiments, monitoring center 400receives identification information from the outlet when the outlet andthe power adapter that are connected to device 110 are not capable ofperforming contraband detection.

In 704, monitoring center 400 performs contraband detection as describedin some embodiments above. For example, contraband detection includesdetermining, based on the received device information, whether device110 is authorized by the controlled environment to receive power whilewithin the controlled environment. In some embodiments, thisdetermination is based on comparing the device identifier with a list ofidentifiers authorized by the controlled environment for receivingpower.

In 706, monitoring center 400 determines whether device 110 is acontraband device based on the performed contraband detection. In 708,if device 110 is not determined to be a contraband device, thenmonitoring center 400 transmits a positive response to the connectedoutlet, power adapter, and/or device 110 where the positive responseindicates that device 110 is approved to receive power. For example, ifconnected outlet is a smart outlet, such as smart outlet 300, then theresponse indicates to the outlet to be transition to or remain in anactive state in order to relay power to device 110. If connected outletis a conventional outlet but the power adapter is a smart power adapter,such as smart power adapter 200, then the response indicates to thepower adapter to transition to or remain in an active state in order torelay power to device 110.

In 710, monitoring center 400 updates the profiles associated withdevice 110, smart power adapter 200, and/or smart outlet 300 to includethe status of the current request as well as any additional informationassociated with the contraband detection.

In 712, if monitoring center 400 determines that device 110 is acontraband device, then monitoring center 400 transmits a negativeresponse to the connected outlet, power adapter, and/or device 110 wherethe negative response indicates that device 110 is not approved toreceive power. For example, if connected outlet is a smart outlet, suchas smart outlet 300, then the response indicates to the outlet totransition or remain in an inactive state in order to prevent power frombeing provisioned to device 110. If connected outlet is a conventionaloutlet but the power adapter is a smart power adapter, such as smartpower adapter 200, then the response indicates to the power adapter toremain or transition to an active state.

In 714, monitoring center 400 sends an alert to the appropriatepersonnel of controlled environment with information regarding thefailed attempt to receive power from an outlet within the controlledenvironment.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the methods of FIGS. 5-7 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 800 is shown inFIG. 8 . One or more of the modules depicted in the previous figures canbe at least partially implemented on one or more distinct computersystems 800.

Computer system 800 includes one or more processors, such as processor804. Processor 804 can be a special purpose or a general purpose digitalsignal processor. Processor 804 is connected to a communicationinfrastructure 802 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 800 also includes a main memory 806, preferably randomaccess memory (RAM), and may also include a secondary memory 808.Secondary memory 808 may include, for example, a hard disk drive 810and/or a removable storage drive 812, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 812 reads from and/or writes to a removable storage unit816 in a well-known manner. Removable storage unit 816 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 812. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 816includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 808 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 800. Such means may include, for example, aremovable storage unit 818 and an interface 814. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 818 and interfaces 814 which allow software anddata to be transferred from removable storage unit 818 to computersystem 800.

Computer system 800 may also include a communications interface 820.Communications interface 820 allows software and data to be transferredbetween computer system 800 and external devices. Examples ofcommunications interface 820 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface820 are in the form of signals which may be electronic, electromagnetic,optical, or other signals capable of being received by communicationsinterface 820. These signals are provided to communications interface820 via a communications path 822. Communications path 822 carriessignals and may be implemented using wire or cable, fiber optics, aphone line, a cellular phone link, an RF link and other communicationschannels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 816 and 818 or a hard disk installed inhard disk drive 810. These computer program products are means forproviding software to computer system 800.

Computer programs (also called computer control logic) are stored inmain memory 806 and/or secondary memory 808. Computer programs may alsobe received via communications interface 820. Such computer programs,when executed, enable the computer system 800 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 804 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 800. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 800 using removable storage drive 812, interface 814, orcommunications interface 820.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A method for contraband detection within acontrolled environment, comprising: receiving, at a smart outlet,adapter identification information associated with a smart power adapterconnected to the smart outlet and user identification informationassociated with a user of a device connected to the smart outlet via thesmart power adapter; determining, based on the adapter identificationinformation and the user identification information, that the device isauthorized to receive power from the smart outlet; activating the smartpower adapter from an inactive state to an active state in response tothe device being authorized; relaying, after the smart adapter isactivated to the active state, the power from the smart outlet to thedevice through the smart power adapter connected between the smartoutlet and the device.
 2. The method of claim 1, wherein receiving theuser identification information comprises: activating a camera on thedevice; causing the camera to capture image data of the user of thedevice; and receiving the image data from the device, wherein the useridentification information comprises the image data.
 3. The method ofclaim 1, wherein determining that the device is authorized to receivethe power from the smart outlet comprises: retrieving a list ofauthorized identifiers associated with devices that are authorized toreceive the power from the smart outlet; comparing the adapteridentification information to the list of authorized identifiers; andidentifying the device as being authorized or not authorized based onthe comparing.
 4. The method of claim 3, further comprising, in responseto the device being identified as not authorized: transmitting an alertmessage to a monitoring center; and maintaining the smart adapter in theinactive state.
 5. The method of claim 4, wherein the alert message istransmitted over a second connection between the smart outlet and themonitoring center, the second connection being a wireless connection ora powerline connection.
 6. The method of claim 1, wherein determiningwhether the device is authorized to receive the power from the smartoutlet comprises: transmitting the adapter identification informationand the user identification information to a monitoring center; andreceiving a contraband response from the monitoring center, wherein thecontraband response indicates whether the device is authorized toreceive the power from the smart outlet.
 7. The method of claim 1,further comprising: querying, by the smart power outlet through thesmart power adapter, the device for device identification informationassociated with the device.
 8. A smart outlet for detecting contrabandwithin a controlled environment, comprising: a memory; and a processorcoupled to the memory, the processor configured to perform operationscomprising: receiving, at the smart outlet, adapter identificationinformation associated with a smart power adapter connected to the smartoutlet and user identification information associated with a user of adevice connected to the smart outlet via the smart power adapter;determining, based on the adapter identification information and theuser identification information, that the device is authorized toreceive power from the smart outlet; activating the smart power adapterfrom an inactive state to an active state in response to the devicebeing authorized; relaying, after the smart adapter is activated to theactive state, the power from the smart outlet to the device through thesmart power adapter connected between the smart outlet and the device;and updating history information of the smart outlet based on theadapter identification information and the user identificationinformation.
 9. The smart outlet of claim 8, the operations furthercomprising: activating a camera on the device; causing the camera tocapture image data of the user of the device; and receiving the imagedata from the device, wherein the user identification informationcomprises the image data.
 10. The smart outlet of claim 8, whereindetermining that the device is authorized to receive the power from thesmart outlet comprises: retrieving a list of authorized identifiersassociated with devices that are authorized to receive the power fromthe smart outlet; comparing the adapter identification information tothe list of authorized identifiers; and identifying the device as beingauthorized or not authorized based on the comparing.
 11. The smartoutlet of claim 10, the operations further comprising, in response toidentifying the device as not being authorized: transmitting an alertmessage to a monitoring center; and maintaining the smart adapter in theinactive state.
 12. The smart outlet of claim 11, wherein the alertmessage is transmitted over a second connection between the smart outletand the monitoring center, the second connection being a wirelessconnection or a powerline connection.
 13. The smart outlet of claim 8,the operations further comprising: transmitting the adapteridentification information and the user identification informationinformation to a monitoring center; and receiving a contraband responsefrom the monitoring center, wherein the contraband response indicatesthat the device is authorized or not authorized to receive the powerfrom the smart outlet.
 14. The smart outlet of claim 8, the operationsfurther comprising: querying, by the smart power outlet through thesmart power adapter, the device for device identification informationassociated with the device.
 15. A non-transitory computer-readablemedium having instructions stored therein, which when executed by aprocessor in a wireless device, cause the processor to performoperations, the operations comprising: receiving, at a smart outlet,adapter identification information associated with a smart power adapterconnected to the smart outlet and user identification informationassociated with a user of a device connected to the smart outlet via thesmart power adapter; determining, based on the adapter identificationinformation and the user identification information, that the device isauthorized to receive power from the smart outlet; activating the smartpower adapter from an inactive state to an active state in response tothe device being authorized; relaying, after the smart adapter isactivated to the active state, the power from the smart outlet to thedevice through the smart power adapter connected between the smartoutlet and the device.
 16. The non-transitory computer readable mediumof claim 15, the operations further comprising: updating historyinformation associated with the smart outlet based on the useridentification information, smart power adapter identificationinformation, and smart outlet identification information.
 17. Thenon-transitory computer readable medium of claim 15, wherein determiningthat the device is authorized to receive the power from the smart outletcomprises: retrieving a list of authorized identifiers associated withdevices that are authorized to receive power from the smart outlet;comparing the adapter identification information to the list ofauthorized identifiers; and identifying the device as being authorizedor not authorized based on the comparing.
 18. The non-transitorycomputer readable medium of claim 17, the operations further comprising,in response to the device being identified as not authorized,transmitting an alert message to a monitoring center.
 19. Thenon-transitory computer readable medium of claim 15, wherein determiningwhether the device is authorized to receive the power from the smartoutlet comprises: transmitting the user identification information andthe adapter identification information to the smart outlet; andreceiving a contraband response from the smart outlet, wherein thecontraband response indicates whether the device is authorized toreceive the power from the smart outlet.