Systems and methods for processing recorded data for storage using computer-aided dispatch information

ABSTRACT

Computer-implemented methods and systems for processing recorded data for storage is provided. An auditable device, such as a digital video camera, stores a set of recorded data. The auditable device also stores auditable event entries that represent auditable events detected by the auditable device. One type of auditable event is the receipt of information from a computer-aided dispatch (CAD) system that indicates an event. The auditable device marks at least one subset of the set of recorded data based on the auditable event entries, and uploads the marked at least one subset of the set of recorded data to an evidence management system.

CROSS-REFERENCES TO RELATED APPLICATIONS

This application is a continuation of U.S. application Ser. No.16/563,810, filed Sep. 6, 2019, which is a continuation of U.S.application Ser. No. 15/210,060, filed Jul. 14, 2016, now U.S. Pat. No.10,430,907, which is a continuation-in-part of U.S. application Ser. No.15/048,218, filed Feb. 19, 2016, now U.S. Pat. No. 10,192,277, whichclaims the benefit of U.S. Provisional Application No. 62/192,466, filedJul. 14, 2015, the entire disclosures of which are hereby incorporatedby reference herein in their entirety.

BACKGROUND

Existing systems for collecting digital video data from wearable camerashave a plethora of technical shortcomings, especially when used in a lawenforcement context. Wearable cameras for law enforcement require longbattery life to last through an entire shift. However, it is alsodesirable to monitor the activities performed with such cameras in orderto ensure that a chain of custody of any videos recorded by the camerascan be provably established, and to ensure that any videos recorded bythe cameras are eventually uploaded to an evidence management system forstorage. Because the cameras require minimal power consumption and haveonly intermittent connectivity to an evidence management system (if anyat all), technical hurdles exist in collecting data from wearablecameras in a way that can provide reliable chain-of-custody informationand preserve battery life at the same time.

SUMMARY

This summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This summary is not intended to identify key features ofthe claimed subject matter, nor is it intended to be used as an aid indetermining the scope of the claimed subject matter.

In some embodiments, a computer-implemented method of processingrecorded data for storage is provided. An auditable device stores a setof recorded data within a data store of the auditable device Theauditable device receives information from a computer-aided dispatchsystem indicating at least one event, wherein the at least one eventincludes an event start time and an event stop time. The auditabledevice marks at least one subset of the set of recorded data based onthe at least one event received from the computer-aided dispatch system.The auditable device uploads the marked at least one subset of the setof recorded data to an evidence management system, wherein the marked atleast one subset of the set of recorded data is less than all of the setof recorded data.

In some embodiments, an auditable camera is provided. The auditablecamera includes a video sensor, a video data store, an audit trail datastore, and an audit trail gathering engine. The video data store isconfigured to store video data generated by the video sensor. The audittrail data store is configured to store a set of auditable evententries. The audit trail gathering engine is configured to, in responseto receiving a notification of an event reported by a component of theauditable camera, record an auditable event entry representing the eventin the audit trail data store. The auditable camera is configured totransmit a subset of the video data stored in the video data store to anevidence management server, wherein the subset of the video data isselected based on the auditable event entry.

In some embodiments, a non-transitory computer-readable medium havingcomputer-executable instructions stored thereon is provided. Theinstructions, in response to execution by one or more processors of anauditable device, cause the auditable device to perform actions forprocessing recorded data for storage that comprise storing a set ofrecorded data within a data store of the auditable device; receivinginformation from a computer-aided dispatch system indicating at leastone event, wherein the at least one event includes an event start timeand an event stop time; marking at least one subset of the set ofrecorded data based on the at least one event received from thecomputer-aided dispatch system; and uploading the marked at least onesubset of the set of recorded data to an evidence management system,wherein the marked at least one subset of the set of recorded data isless than all of the set of recorded data.

DESCRIPTION OF THE DRAWINGS

The foregoing aspects and many of the attendant advantages of thisinvention will become more readily appreciated as the same become betterunderstood by reference to the following detailed description, whentaken in conjunction with the accompanying drawings, wherein:

FIG. 1 is a high-level schematic diagram that illustrates communicationbetween various components of an exemplary embodiment of a systemaccording to various aspects of the present disclosure;

FIG. 2 is a block diagram that illustrates components of an exemplaryembodiment of an auditable camera according to various aspects of thepresent disclosure;

FIG. 3 is a block diagram that illustrates an exemplary embodiment of acoordinator computing device according to various aspects of the presentdisclosure;

FIG. 4 is a block diagram that illustrates an exemplary embodiment of anevidence management system according to various aspects of the presentdisclosure;

FIGS. 5A-5B are a flowchart that illustrates an exemplary embodiment ofa method of auditing camera activity according to various aspects of thepresent disclosure;

FIG. 5C is a flowchart that illustrates an exemplary embodiment of aprocedure for transmitting recorded data to an evidence managementsystem according to various aspects of the present disclosure;

FIG. 6 is a flowchart that illustrates an exemplary embodiment of amethod of managing collected audit trail data according to variousaspects of the present disclosure; and

FIG. 7 is a block diagram that illustrates aspects of an exemplarycomputing device 700 appropriate for use as a computing device of thepresent disclosure.

DETAILED DESCRIPTION

Embodiments of the present disclosure solve the technical problemsintroduced above, as well as others. In some embodiments, auditabledevices such as auditable cameras are provided. The auditable devicesmaintain audit trail data that is digitally signed and stored on thedevices until it can be uploaded to an evidence management system. Whenan intermittent data connection to the evidence management system isavailable, the auditable devices transmit records of urgent events tothe evidence management system, so that the evidence management systemis notified to expect further data associated with the events despitethe lack of persistent data connectivity to the device. By using theseand other techniques, the technical problems introduced above and otherscan be overcome.

FIG. 1 is a high-level schematic diagram that illustrates communicationbetween various components of an exemplary embodiment of a systemaccording to various aspects of the present disclosure. In someembodiments, the system 100 is configured to allow for collection ofauditing information from a plurality of auditable devices. The auditinginformation is generated by the auditable devices while they are beingoperated, and is gathered by an evidence management system 102.

In general, a user 92, such as a law enforcement officer, may carry oneor more auditable devices. The devices may include, but are not limitedto, an auditable camera 106, an auditable weapon 108, and a light barsensor 110. The auditable camera 106 may be, for example, a wearablecamera that records video and/or audio data when activated, and stores arecord of auditable events that occur (such as the start of recording,the end of recording, various device faults, and/or the like and asdescribed further below). The auditable weapon 108 may be, for example,a conducted energy weapon (CEW) that records firing events, cartridgeloading, holster removal, and/or the like. The light bar sensor 110 maydetect activation of the light bar on the vehicle 94, which is usuallyassociated with an emergency situation. Other auditable devices, such asa dashboard camera, a heart rate sensor, may also be included in thesystem 100 but are not illustrated in FIG. 1.

In some embodiments, the auditable devices may have limitedcommunication functionality. For example, auditable devices may only beable to transmit information to the evidence management system 102 whenphysically connected to an evidence collection dock 104 thatcommunicates with the evidence management system 102 via a broadbandnetwork 90 such as a LAN, a WAN, and/or the Internet. Accordingly,technical problems arise when attempting to obtain verifiably completeauditing information in that there is no reliable, always-oncommunication path between the evidence management system 102 and theauditable devices.

In some embodiments, an ad-hoc communication path may be created betweenthe auditable device and the evidence management system 102 via acoordinator computing device 107. The coordinator computing device 107is illustrated as a smartphone computing device, but in some embodimentsmay be a laptop computing device, a tablet computing device, or anyother suitable computing device capable of being carried by the user 92or a vehicle 94 associated with the user 92 and capable of performingthe actions described herein. The coordinator computing device 107communicates with the auditable devices, and may also communicate withother devices such as a light bar sensor 110 of a vehicle 94 associatedwith the user 92, using a short-range wireless communication technologysuch as Bluetooth, Bluetooth low energy, Zigbee, IrDA, ANT, ANT+,802.15.4, near-field communication (NFC), a radio frequency identifier(RFID) tag, and/or the like. In some embodiments, the auditable camera106 may receive data directly from other auditable devices such as anauditable weapon 108 or a light bar sensor 110 in order to enhance theauditable event entries collected by the auditable camera 106.

The coordinator computing device 107 is capable of communicating withthe evidence management system 102, though the communication pathbetween the coordinator computing device 107 may be unreliable, maydrain battery performance too greatly to be constantly enabled, or maybe of relatively low bandwidth. As such, the communication ofinformation from the coordinator computing device 107 to the evidencemanagement system 102 may be sporadic and may transmit only a subset ofinformation gathered by or audited on the auditable devices. Though asingle coordinator computing device 107 is illustrated, in someembodiments more than one coordinator computing device 107 may beassociated with a vehicle 94. For example, a smartphone carried by theuser 92 may be a first coordinator computing device 107, and a mobiledata terminal (MDT) or mobile digital computer (MDC) mounted in thevehicle 94 may be a second coordinator computing device 107.

In some embodiments, auditable devices (such as the auditable camera 106and the auditable weapon 108) and/or coordinator computing devices 107may also communicate with a computer-aided dispatch (CAD) system 101.The CAD system 101 may communicate with the auditable devices and/orcoordinator computing devices 107 using any suitable technique,including but not limited to internet data communication over 3G, 4G,LTE, or a similar long-range wireless protocol; short message service(SMS) messages, selective calling, or any other suitable technique. TheCAD system 101 may communicate directly with the auditable devices ormay communicate with the auditable devices via the coordinator computingdevice 107.

Further aspects of these devices and their capabilities will bediscussed below.

FIG. 2 is a block diagram that illustrates components of an exemplaryembodiment of an auditable camera according to various aspects of thepresent disclosure. In some embodiments, the auditable camera 106 is awearable camera that provides a point of view associated with the user92. In some embodiments, the auditable camera 106 may be attached toanother device carried by the user 92, such as a weapon.

As with any camera, the auditable camera 106 includes at least a videosensor 202, and may also include an audio sensor 206. Data collected bythe video sensor 202 and the audio sensor 206 may be stored in a videodata store 222 and an audio data store 224, respectively, though in someembodiments the audio and video information is stored together in asingle data store and/or in a combined data file. One example of anappropriate video sensor is a charge-coupled device (CCD), though anyother digital image sensor, such as a complementarymetal-oxide-semiconductor (CMOS) sensor, an active pixel sensor, or anyother type of digital image sensor could be used instead. Any type ofmicrophone may be used as an audio sensor 206.

As understood by one of ordinary skill in the art, a “data store” asdescribed herein may be any suitable device configured to store data foraccess by a computing device. One example of a data store suitable foruse with the high capacity needs of the evidence management system 102is a highly reliable, high-speed relational database management system(RDBMS) executing on one or more computing devices and accessible over ahigh-speed network. However, any other suitable storage technique and/ordevice capable of quickly and reliably providing the stored data inresponse to queries may be used, such as a key-value store, an objectdatabase, and/or the like. Further, for the evidence management system102, the computing device providing the data store may be accessiblelocally instead of over a network, or may be provided as a cloud-basedservice. A data store may also include data stored in an organizedmanner on a computer-readable storage medium, as described furtherbelow. One example of a data store suitable for use with the needs ofthe auditable camera 106 and the coordinator computing device 107, whichincludes reliable storage but also low overhead, is a file system ordatabase management system that stores data in files (or records) on acomputer readable medium such as flash memory, random access memory(RAM), hard disk drives, and/or the like. One of ordinary skill in theart will recognize that separate data stores described herein may becombined into a single data store, and/or a single data store describedherein may be separated into multiple data stores, without departingfrom the scope of the present disclosure.

The auditable camera 106 includes a set of engines, including a cameracontrol engine 204, an audit trail signing engine 210, an audit trailgathering engine 214, and an audit trail reporting engine 212. Ingeneral, the term “engine” as used herein refers to logic embodied inhardware or software instructions, which can be written in a programminglanguage, such as C, C++, COBOL, JAVA™, PHP, Perl, HTML, CSS,JavaScript, VBScript, ASPX, Microsoft.NET™ languages such as C#, and/orthe like. An engine may be compiled into executable programs or writtenin interpreted programming languages. Engines may be callable from otherengines or from themselves. Generally, the engines described hereinrefer to logical modules that can be merged with other engines orapplications, or can be divided into sub-engines. The engines can bestored in any type of computer readable medium or computer storagedevice and be stored on and executed by one or more general purposecomputers, thus creating a special purpose computer configured toprovide the engine. Accordingly, the devices and systems illustratedherein include one or more computing devices configured to provide theillustrated engines, though the computing devices themselves have notbeen illustrated in every case for the sake of clarity.

The camera control engine 204 is configured to cause the auditablecamera 106 to perform camera functions. For example, the camera controlengine 204 may cause the video sensor 202 and audio sensor 206 to beginobtaining data, and may save the video and/or audio data in a video datastore 222 and/or audio data store 224 after receiving it from thesensor. The camera control engine 204 may receive commands to start,pause, or stop the video recording from a physical user interface device208, or may automatically start, pause, or stop the video recording inresponse to a signal received from some other component of the auditablecamera 106 (such as the battery sensor 234, the clock 230, the motionsensor 238, the short-range wireless interface 228, and/or the like).The camera control engine 204 may also change settings on the videosensor 202 and/or audio sensor 206, such as an image quality, a whitebalance setting, a gain, and/or any other common video or audiorecording setting, based on configuration settings received via aphysical user interface device 208, via the short-range wirelessinterface 228, via the physical dock interface 232, or by any othersuitable technique. Any type of physical user interface device 208 thatcan transmit commands to the camera control engine 204 may be used,including but not limited to push button switches, toggle switches,slide switches, touch switches, and/or the like.

In some embodiments, the camera control engine 204 may report starting,pausing, or stopping the video recording, as well as the settings forthe video sensor 202 and audio sensor 206, as auditable events to theaudit trail gathering engine 214. In some embodiments, the cameracontrol engine 204 may embed the sensor configuration information in thedata stored in the video data store 222 and/or audio data store 224,along with other information about the state of the auditable camera 106or other information received via the short-range wireless interfaceabout other auditable devices, to prevent the additional informationfrom being disassociated with the video and/or audio data.

The auditable camera 106 also includes an audit trail data store 216 forstoring records of auditable events and a certificate data store 218 forstoring data usable for digital signing. The audit trail gatheringengine 214 is configured to receive reports of auditable events from theother components of the auditable camera 106, and to record auditableevent records that represent the events in the audit trail data store216. The audit trail signing engine 210 is configured to use one or moresigning certificates from the certificate data store 218 to apply adigital signature to the auditable event records in the audit trail datastore 216. The audit trail reporting engine 212 is configured totransmit the audit trail information from the audit trail data store 216to the evidence management system 102, either directly via thelong-range wireless interface 226 or physical dock interface 232, or viathe short-range wireless interface 228 and the coordinator computingdevice 107. Further details of the functionality of these components areprovided below.

The auditable camera 106 also includes a number of general components,including a clock 230, a motion sensor 238, a physical dock interface232, a battery sensor 234, a battery 236. The clock 230 may be used bythe audit trail gathering engine 214, the audit trail reporting engine212, the camera control engine 204, or any other component of theauditable camera 106 to include timestamp information in generated data.The motion sensor 238, such as a multi-axis accelerometer, also producesinformation that may be used by other components. For example, the audittrail gathering engine 214 may use the motion sensor 238 to detect acertain type of motion, such as running, falling, and/or the like, andto treat the detected motion as an auditable event.

The physical dock interface 232 is configured to mate with a physicalconnector on the evidence collection dock 104. In some embodiments, thephysical dock interface 232 may include a female 2.5 mm socket, whichmates with a male 2.5 mm plug of the evidence collection dock 104. Oncedocked, the auditable camera 106 may then transfer data to the evidencemanagement system 102 via the connection using any suitable datatransmission protocol. In some embodiments, power may be transferred tothe auditable camera 106 via the physical dock interface 232 instead ofor in addition to the data transfer. In some embodiments, otherconnection hardware that can provide both power and data connectivitymay be used, such as a USB connector, a Firewire connector, and/or thelike.

The battery sensor 234 and the battery 236 are an example of an internalsystem that may generate auditable events that are captured by the audittrail gathering engine 214 without user intervention. For example, thebattery sensor 234 may detect a low battery state, a battery overheatingstate, and/or the like, and may generate alerts to be logged asauditable events by the audit trail gathering engine. Other well-knowninternal device systems, such as a file system controller, a free-fallsensor, and/or the like, may similarly generate alerts to be logged asauditable events, but are not illustrated here.

The auditable camera 106 also includes an optional long-range wirelessinterface 226 and an optional short-range wireless interface 228. Thelong-range wireless interface 226 may use any suitable networkingtechnology capable of establishing a wireless data connection to theevidence management system 102 (or other computing devices accessiblevia the network 90, such as the computer-aided dispatch system 402 orthe records management system 404) from the auditable camera 106 fromany geographical area, including but not limited to 3G, 4G, LTE, and/orthe like. The short-range wireless interface 228 may use any suitablewireless networking technology capable of establishing a wireless dataconnection to the coordinator computing device 107 when within range ofthe coordinator computing device 107, including but not limited toBluetooth, Bluetooth low energy, ZigBee, NFC, and/or the like. Thesewireless interfaces are illustrated as optional, because someembodiments may be missing one or both interfaces. For example, in someembodiments, the only communication performed by the auditable camera106 may be through the physical dock interface 232. As another example,in some embodiments only the short-range wireless interface 228 may bepresent, and so the auditable camera 106 may only be able to communicatewith the evidence management system 102 via the physical dock interface232 or via the short-range wireless interface 228 through thecoordinator computing device 107.

In some embodiments, actions by the auditable camera 106 trigger actionreporting to one or more computing devices besides the evidencemanagement system 102. In one example, where the user 92 is a responder(e.g., police officer), actions by the auditable camera 106 triggerreporting action reporting to a computing device associated with asupervisor of the user 92 and/or a computing device associated withanother responder associated with the user 92 (e.g., a partner of user92). Actions that may trigger action reporting include starting,pausing, or stopping video recording. Other actions that may triggeraction reporting may include the manner in which actions by theauditable camera 106, such as manually starting video recording by theuser 92, automatic starting video recording by a remote computing device(e.g., a dispatch computing device), and the like.

When action reporting is triggered, the auditable camera 106 sends asignal to the one or more computing devices. The signal sent fromauditable camera 106 can be sent via the network 90 to the one or morecomputing devices, via the coordinator computing device 107 and thenetwork 90 to the one or more computing devices, via the evidencecollection dock 104 and the network 90 to the one or more computingdevices, or to the one or more computing devices via any othercommunication path. The signal may be in the form a text message, anemail message, a signal that causes an audible or visual alert, and thelike.

Action reporting may be used as an alert to other users associated withthe user 92. In one example, the user 92 is a responder and theauditable camera 106 is configured to send an action report to acomputing device of a supervisor of the user 92 in response to theauditable camera 106 pausing video recording. This allows the supervisorto know that a recording was paused and possibly investigate why therecording was paused. In this example, the auditable camera 106 may notbe configured to send an action report to the computing device of thesupervisor in response to the auditable camera 106 starting or stoppingvideo recording as such starting or stopping video recording may occurtoo frequently for the supervisor to want alerts. In another example,the user 92 is a responder and the auditable camera 106 is configured tosend an action report to a computing device of another responderassociated with the user 92 in response to a video recording of theauditable camera 106 being manually started. Manual starting of thevideo recording may indicate that a situation of interest is occurringaround the user 92 and action reporting in response to manual startingmay be an alert to the other responder to be aware of the situation.

Though FIG. 2 illustrates components of a camera, one of ordinary skillin the art will recognize that, other than the components that make thedevice a camera such as the video sensor 202, audio sensor 206, and theassociated data stores, similar components may be included in anauditable weapon 108 or an auditable device of some other type.

FIG. 3 is a block diagram that illustrates an exemplary embodiment of acoordinator computing device according to various aspects of the presentdisclosure. As illustrated, the coordinator computing device 107, whichas stated above may be a smart phone or any other suitable computingdevice, includes a short-range wireless interface 306, a long-rangewireless interface 310, and a GPS sensor 314. The short-range wirelessinterface 306 is configured to allow the components of the coordinatorcomputing device 107 to communicate with the other nearby components ofthe system 100 when they are within range, including auditable devicessuch as the auditable camera 106 and the auditable weapon 108 and thelight bar sensor 110 of the vehicle 94. The short-range wirelessinterface 306 may use one or more short-range wireless networkingtechnologies such as those discussed above with respect to the auditablecamera 106 in order to provide these communication paths. The long-rangewireless interface 310 is configured to allow the coordinator computingdevice 107 to communicate data with the evidence management system 102as long as the coordinator computing device 107 is within a service areaof a corresponding long-range wireless data service, such as 3G, 4G,LTE, and/or the like. The GPS sensor 314 is configured to obtain ageographic position of the coordinator computing device 107 usingsatellite signals, triangulation of cellular phone towers, or any othertechnique known to one of ordinary skill in the art.

The coordinator computing device 107 also includes one or more userinterface devices 302, a user interface engine 304, an auditable devicecommunication engine 308, and a system communication engine 312. The oneor more user interface devices 302 may include, but are not limited to,physical buttons, status lights, a display, a touch-screen display, aloudspeaker, and/or the like. The user interface engine 304 isconfigured to present an interactive interface to the user 92 andreceive input from the user 92 via the user interface devices 302. Theinteractive interface may allow the user 92 to control the auditabledevices, add information to auditable events, generate auditable events,manually initiate an upload of urgent auditable events to the evidencemanagement system 102, and/or take other actions within the system 100.The auditable device communication engine 308 manages communication withthe auditable devices via the short-range wireless interface 306, andthe system communication engine 312 manages communication with theevidence management system 102. Further details of the functionality ofthe components of the coordinator computing device 107 are providedbelow.

FIG. 4 is a block diagram that illustrates an exemplary embodiment of anevidence management system according to various aspects of the presentdisclosure. In some embodiments, the evidence management system 102comprises a plurality of computing devices configured to provide theillustrated components, though they are described as a single system forclarity. One of ordinary skill in the art will recognize that anysuitable server system, such as a single server, a server farm, a cloudservice, and/or the like, may be used to provide the functionality ofthe evidence management system 102.

As illustrated, the evidence management system 102 includes acomputer-aided dispatch system interface 406, a records managementsystem interface 408, and a network interface 422. The computer-aideddispatch system interface 406 enables the evidence management system 102to communicate with one or more computer-aided dispatch (CAD) systems402 operated by other parties. This communication allows the evidencemanagement system 102 to automatically import information from the CADsystems 402, such as incident codes, user 92 or vehicle 94 locations atgiven times, event start and/or stop information, and/or the like. Thisinformation may then be correlated with or otherwise used to enhanceinformation received from auditable devices. For example, the eventstart and/or stop information could be used by the evidence managementsystem 102 to determine which portions of a larger set of recorded dataare important and should be retrieved and saved in a data store of theevidence management system 102. Such examples are discussed furtherbelow. In some embodiments, the evidence management system 102 mayretrieve information from the CAD system 402 and transmit it to one ormore auditable devices.

The records management system interface 408 enables the evidencemanagement system 102 to communicate with one or more records managementsystems 404 operated by other parties. This communication likewiseallows the evidence management system 102 to automatically importinformation such as case numbers and/or the like. The records managementsystem interface 408 may also provide information from the evidencemanagement system 102 back to the records management systems 404,including but not limited to links to data stored in the video datastore 412, the audio data store 414, and/or the audit trail data store416; copies of audit trail information stored in the audit trail datastore 416; and/or the like. As with the connections to the CAD system(s)402, information from the records management system 404 could be used toindicate which portions of a larger set of recorded are to be retrievedand saved in a data store of the evidence management system 102, andinformation from the records management system 404 could be transmittedby the evidence management system 102 to one or more auditable devices.

The evidence management system 102 also includes an auditable devicedata store 410, a video data store 412, an audio data store 414, and anaudit trail data store 416. The auditable device data store 410 may beconfigured to store information associated with each of the auditabledevices of the system 100. For example, for a given auditable camera106, the auditable device data store 410 may store information such as aunique device identifier, an identifier (such as a badge number or thelike) of a user 92 associated with the auditable camera 106 at a giventime or date, capabilities of the auditable camera 106, and/or the like.The video data store 412 and audio data store 414 are configured tostore data captured by one or more auditable cameras 106 or otherdevices that can capture audio and/or video data and are enrolled withthe system 100. In some embodiments, the video data store 412 and audiodata store 414 are merged into a single data store, and audio and videodata that are recorded contemporaneously may be stored together in asingle file. The audit trail data store 416 stores records of auditableevents detected by the auditable devices of the system 100, as describedfurther below.

The evidence management system 102 also includes a data gathering engine418 and a user interface engine 420. The data gathering engine 418 isconfigured to receive audit trail information, video data, audio data,and/or other recorded data from the auditable devices via the evidencecollection dock 104 and the coordinator computing device 107. The userinterface engine 420 is configured to generate and present userinterfaces for displaying and interacting with the data collected by theevidence management system 102 via web pages, application programminginterfaces, or any other suitable technology. Each of the interfaces andengines of the evidence management system 102 is configured to use anetwork interface 422 for communication with other components of thesystem 100 via the Internet. Further description of the actions taken bythe components of the evidence management system 102 is provided below.

FIGS. 5A-5B are a flowchart that illustrates an exemplary embodiment ofa method of auditing camera activity according to various aspects of thepresent disclosure. One of ordinary skill in the art will recognizethat, although a method of auditing camera activity is illustrated anddescribed, other devices that detect events (such as the auditableweapon 108, the light bar sensor 110, and/or the like) could also beaudited using a similar method, though for such devices the actionsrelating to transfer of video and/or audio data may not be performed.

From a start block, the method 500 proceeds to block 502, where an audittrail gathering engine 214 of an auditable camera 106 detects adisconnection of the auditable camera 106 from a physical dock interface232. In some embodiments, when the physical dock interface 232 iselectrically disconnected from the evidence collection dock 104, thephysical dock interface 232 transmits a signal to the audit trailgathering engine 214 to notify it of the disconnection event. Next, atblock 504, the audit trail gathering engine 214 creates an auditableevent entry in an audit trail data store 216 of the auditable camera 106indicating that the auditable camera 106 has been undocked.

In some embodiments, particularly where the user 92 is a law enforcementofficial, the undocking auditable event entry may indicate the start ofa shift and the related start of auditing activities related to thatshift. In some embodiments, the audit trail data store 216 may have beenemptied after the previously recorded information was transmitted to theevidence management system 102 (as described further below), so at thispoint, the auditable event entry indicating the start of shift may bethe only auditable event entry in the audit trail data store 216.

The method 500 then proceeds to block 508, where the audit trailgathering engine 214 receives a signal indicating an auditable event.The signal may be received from another component of the auditablecamera 106, such as the camera control engine 204, the battery sensor234, a physical user interface device 208, the physical dock interface232, or any other component. The signal may indicate any of a widevariety of auditable events. These events include, but are not limitedto: a start recording event, a stop recording event, a pause recordingevent, a button press event, a battery or other hardware fault, abattery charge status threshold event, a storage error, a free storagethreshold event, an interaction or connection status change via awireless interface, an interaction or connection status change via thephysical dock interface 232, a physical motion event, a lack-of-physicalmotion event (i.e., the auditable camera 106 has remained stationary fora given amount of time, an environmental event such as a change inenvironmental temperature or humidity past a threshold value, a geofenceevent, a drop event, and a debug event.

At block 510, the audit trail gathering engine 214 creates an auditableevent entry in the audit trail data store 216. In some embodiments, theauditable event entry includes information that identifies the type ofthe event (such as a numeric event type identifier, an event typestring, and/or the like), and may include further information associatedwith the event. As several non-limiting examples, a hardware faultauditable event entry may include a fault type and a fault code; a startrecording event may include camera settings such as exposure, F-stop,frame rate, and/or the like; a battery fault event may also indicate thetype of battery fault; and so on. In some embodiments, the audit trailgathering engine 214 may actively obtain other information to include inthe auditable event entry that cannot be derived solely from informationincluded in the signal. As several non-limiting examples, the audittrail gathering engine 214 may itself obtain a timestamp from the clock230 to be included in the auditable event entry; the audit trailgathering engine 214 may use the short-range wireless interface 228 toobtain GPS information or user-entered metadata from the coordinatorcomputing device 107 to be included in the auditable event entry; and soon.

At optional block 512, data associated with the event obtained by one ormore sensors of the auditable camera 106 is stored in one or more datastores 222, 224 of the auditable camera 106 and is associated with theauditable event entry. For example, if the event is a start recordingevent, then data obtained by the camera control engine 204 from thevideo sensor 202 may be stored in the video data store 222, and/or dataobtained by the camera control engine 204 from the audio sensor 206 maybe stored in the audio data store 224. To associate the stored data withthe auditable event entry, a unique identifier of the auditable evententry may be stored along with the video or audio data, and/or a uniqueidentifier of the video and/or audio data may be stored in the auditableevent entry. The actions described with respect to block 512 areoptional because some events, like battery faults, may not be related tothe recording of data to be stored in one of the data stores 222, 224.In some embodiments, the actions described with respect to block 512occur at other times and are not limited to this point in the overallmethod 500. For example, data such as video and/or audio data may berecorded continuously by the auditable camera 106. The auditable evententries may then be associated with or otherwise used to identifysubsets of interest within the recorded data.

At block 514, an audit trail signing engine 210 of the auditable camera106 applies a digital signature to the auditable event entry. In someembodiments, applying the digital signature uses a cryptographic hash toguarantee that the auditable event entry has not been altered orcorrupted since being signed. For example, in one non-limitingembodiment, the evidence management system 102 may assign a private keyto the auditable camera 106, which is stored in the certificate datastore 218 when the auditable camera 106 is connected via the physicaldock interface 232. The private key is used by the audit trail signingengine 210 to create a cryptographic hash of the auditable event entry,which is then added to the auditable event entry to sign it.Subsequently, a public key made available by the evidence managementsystem 102 may be used to verify that the auditable event entry has notbeen tampered with since it was signed. In some embodiments, thecryptographic hash may be stored elsewhere, such as in the certificatedata store 218, and may simply be associated with the auditable evententry instead of being added to it. In some embodiments, the audit trailsigning engine 210 may sign the data stored in the video data store 222and the audio data store 224 using a similar technique. In someembodiments, the signatures generated for the video and/or audio datamay be added to the auditable event entry before the auditable evententry is signed. In some embodiments, some other suitable technique forapplying digital signatures that ensure that data has not been alteredor corrupted is used instead of the technique described above.

In some embodiments, the actions described with respect to block 514 maybe performed in response to the creation of the auditable event entry asis illustrated. In some embodiments, the actions described with respectto block 514 may instead be performed later, such as in response to arequest to transmit the auditable event entry to the evidence managementsystem 102. Waiting to apply the signature until shortly before uploadmay help to conserve battery life, as the signature processing for muchof the information could be deferred until the auditable camera 106 iscoupled to the evidence collection dock 104 and is therefore receivingpower.

One will note that, if the identifier or signature of the video dataand/or audio data is stored in the auditable event entry before thesignature is applied to the auditable event entry, then the signaturesensure that the auditable event entry cannot be tampered with to referto a different video and the video/audio data cannot be replaced withoutinvalidating the signatures. Accordingly, the technical problem of howto irrefutably associate recorded videos with a lightweight log ofactions performed by an auditable camera 106 despite intermittentconnectivity can be overcome.

At this point in the method 500, the storage of the auditable evententry in the audit trail data store 216 is complete. In most cases, themethod 500 would then loop back and wait for a subsequent auditableevent, though there are two special cases where the method 500 wouldeither perform additional processing or exit the loop instead of simplylooping back. Accordingly, the method 500 proceeds to a decision block516, where a determination is made regarding whether the auditable eventindicated that the auditable camera 106 was placed in an evidencecollection dock 104. As with the disconnection event described abovewith respect to block 502, this may be detected by an electricalconnection being made via the physical dock interface 232, and a signalbeing provided by the physical dock interface 232 to the audit trailgathering engine 214 accordingly. If the result of the determination atdecision block 516 is YES, then the method 500 proceeds to acontinuation terminal (“terminal B”).

From terminal B (FIG. 5B), the method 500 proceeds to block 526, wherethe audit trail reporting engine 212 transmits contents of the audittrail data store 216 to the data gathering engine 418 of the evidencemanagement system 102 via the physical dock interface 232 and theevidence collection dock 104. In some embodiments, the evidencecollection dock 104 may include a memory, a processor, and networkinghardware that are configured to enable the evidence collection dock 104to download the contents of the audit trail data store 216 from theauditable camera 106 and to subsequently upload the contents to the datagathering engine 418 via the network 90 using any suitable datatransmission technique.

At block 528, in response to receiving an acknowledgement receipt fromthe evidence management system 102, the audit trail gathering engine 214clears the contents of the audit trail data store 216. Waiting for theacknowledgement receipt ensures that the audit trail data was receivedby the evidence management system 102 and was stored successfully beforeit is cleared from the auditable camera 106. In some embodiments, theevidence management system 102 may provide one acknowledgement receiptfor the entire contents of the audit trail data store 216. In someembodiments, the evidence management system 102 may provideacknowledgement receipts for subsets of the uploaded data. For example,data may be uploaded in chronological order from the audit trail datastore 216, and the evidence management system 102 transmits anacknowledgement receipt for each individual piece of content.Subsequently, each piece of content would be deleted from the auditablecamera 106 once its corresponding acknowledgement receipt is received.Such an embodiment would allow an upload to be interrupted and theauditable camera 106 to be reused without losing any of the data alreadystored on the auditable camera 106.

At optional procedure block 530, the auditable camera 106 transmitscontents of other data stores of the auditable camera 106 to theevidence management system 102. For example, the auditable camera 106may transmit the data from the video data store 222 and/or the audiodata store 224, if any, to the evidence management system 102 upon beingconnected to the physical dock interface 232, or via the long-rangewireless interface 226. As another example, the auditable camera 106 maytransmit the data to the coordinator computing device 107 via theshort-range wireless interface 228, and the coordinator computing device107 may in turn transmit the data to the evidence management system 102.In some embodiments, the procedure used at procedure block 530 comprisestransmitting all of the data from the video data store 222, the audiodata store 224, or any other data store of the auditable camera 106 tothe evidence management system 102. In some embodiments, the procedureused at procedure block 530 may comprise causing limited subsets of thedata within the video data store 222, the audio data store 224, or anyother data store of the auditable camera 106 to be transmitted to theevidence management system 102. One example procedure suitable for usein procedure block 530 is illustrated in FIG. 5C and described infurther detail below.

The actions associated with block 530 are described as optional, becausein some embodiments, there might not be any such data, particularly ifthe method 500 is being used with an auditable device other than anauditable camera 106, such as an auditable weapon 108. In someembodiments, the actions of block 530 may happen before (orcontemporaneously with) the actions of block 526. In some embodiments,an acknowledgement receipt may be generated by the evidence managementsystem 102 for the video/audio data as well, and receiving theacknowledgement receipt may cause the auditable camera 106 to delete itscopy of the transferred audio/video data. The method 500 then proceedsto an end block and terminates.

Returning to decision block 516 (FIG. 5A), if the result of thedetermination regarding whether the event indicates that the auditablecamera 106 has been connected to a physical dock is NO, then the method500 proceeds to another decision block 518, where a determination ismade regarding whether the auditable event is an urgent event. An urgentevent is an auditable event for which the system 100 is configured toensure that the evidence management system 102 is made aware of as soonas possible, even before the auditable device is returned to theevidence collection dock 104. This functionality is useful to ensurethat, for urgent events, the associated data is eventually uploaded tothe evidence management system 102 and is not instead forgotten. Oneexample of an urgent event may be a start recording event, and anexample of a non-urgent event may be a battery fault event. If thesystem 100 is configured to consider a start recording event to be anurgent event, then the evidence management system 102 will be notifiedeach time a recording is started with an auditable camera 106, even ifthe associated video and/or audio is not uploaded to the evidencemanagement system 102. This information can be used in many ways,including prompting the user 92 to dock the auditable camera 106 inorder to upload the missing video, providing a data trail indicatingthat all relevant videos for an incident or during a given time periodwere uploaded, and/or the like.

In some embodiments, an urgent event may be reported by the auditablecamera 106 to one or more computing devices other than the evidencemanagement system 102. In one example, the urgent event may betransmitted to a computing device associated with a supervisor of theuser 92 and/or a computing device associated with another userassociated with the user 92 (e.g., in an example where the user 92 is alaw enforcement officer, the other user may be a partner of the user92). Auditable events that may be considered urgent events in such anembodiment may include starting, pausing, or stopping video recording.In some embodiments, the manner in which video recording is controlledmay determine whether an associated auditable event is urgent or not,and/or whether the urgent event is reported to computing devices otherthan the evidence management system 102 instead of or in addition tobeing reported to the evidence management system 102. For example,manually starting video recording by the user 92 or automatic startingof video recording in response to a signal received from a remotecomputing device (e.g., a dispatch computing device) may be consideredurgent events to be reported to computing devices other than theevidence management system 102 due to the likelihood that other usersassociated with the user 92 would benefit from being immediatelyinformed of the event.

If the result of the determination at decision block 518 is NO and theauditable event is not an urgent event, then the method 500 proceeds toa continuation terminal (“terminal A”), and from terminal A returns toblock 508 upon the receipt of a subsequent signal indicating anauditable event. Otherwise, if the result of the determination atdecision block 518 is YES and the auditable event is an urgent event,then the method 500 proceeds to another continuation terminal (“terminalC”).

From terminal C (FIG. 5B), the method 500 proceeds to block 520, wherean audit trail reporting engine 212 of the auditable camera 106initiates a connection to a coordinator computing device 107 via ashort-range wireless interface 228 of the auditable camera 106. In someembodiments, the audit trail reporting engine 212 uses the short-rangewireless interface 228 to establish a wireless connection to thecoordinator computing device 107. In some embodiments, the wirelessconnection to the coordinator computing device 107 may already beavailable, and the audit trail reporting engine 212 just uses theexisting connection.

At block 522, the audit trail reporting engine 212 transmits theauditable event entry to the coordinator computing device 107 via theshort-range wireless interface 228. Next, at block 524, the coordinatorcomputing device 107 transmits the auditable event entry to a datagathering engine 418 of an evidence management system 102 via along-range wireless interface 310 of the coordinator computing device107.

In some embodiments, one or more of the actions described in blocks520-524 may be performed when an opportunity arises to do so, if theactions cannot be performed immediately. For example, upon detecting theurgent event, the auditable camera 106 may not be within short-rangewireless communication range of the coordinator computing device 107. Insuch a case, the audit trail reporting engine 212 may wait for anotification from the short-range wireless interface 228 that it hasreturned within range before proceeding. An example of this case wouldbe if the user 92 leaves the vehicle 94, and the coordinator computingdevice 107 is left within the vehicle 94. The communication channel tothe coordinator computing device 107 would be opened once the user 92returned to the vehicle 94, or to a location near enough to the vehicle94 to be within short-range wireless communication range. As anotherexample, in some embodiments, the long-range wireless interface 310 ofthe coordinator computing device 107 could be 3G, 4G, LTE, or anotherwireless network with broad geographic coverage such that thecoordinator computing device 107 would usually remain connected to theevidence management system 102. However, even with broad geographiccoverage, the user 92 may take the coordinator computing device 107through an area without wireless data coverage (such as a tunnel, avalley, a parking garage, and/or the like), or may use a long-rangewireless technology with more limited connection range or geographiccoverage (such as WiFi). In such limited connectivity environments, thecoordinator computing device 107 may receive and store the auditableevent entry from the auditable camera 106, and transmit it to theevidence management system 102 once a data connection becomes availablevia the long-range wireless interface 310.

In embodiments wherein urgent events are transmitted to one or morecomputing devices other than the evidence management system 102, theauditable camera 106 sends the auditable event entry to the one or morecomputing devices. In some embodiments, the auditable event entry may besent to the one or more computing devices via the coordinator computingdevice 107 as discussed above with relation to sending the auditableevent entry to the evidence management system 102. In some embodiments,the auditable event entry may be sent to the one or more computingdevices via the evidence collection dock 104 and the network 90, via thelong-range wireless interface 226 and the network 90, or via any othercommunication path. The signal may be in the form a text message, anapplication-directed SMS, an email message, a signal that causes anaudible or visual alert, and/or the like.

Such urgent event reporting may be used as an alert to other usersassociated with the user 92. In one example, the user 92 is a responderand the auditable camera 106 is configured to send an action report to acomputing device of a supervisor of the user 92 in response to theauditable camera 106 pausing video recording. This allows the supervisorto know immediately that a recording was paused and possibly investigatewhy the recording was paused. In this example, the auditable camera 106may not be configured to consider starting or stopping video recordingan urgent event to be transmitted to computing devices other than theevidence management system 102, as such starting or stopping videorecording events may occur too frequently for the supervisor to wantalerts. In another example, the user 92 is a responder and the auditablecamera 106 is configured to send an auditable event entry for an urgentevent to a computing device of another responder associated with theuser 92 in response to an event that indicates that video recording ofthe auditable camera 106 is manually started, such as a button pressevent. Manual starting of the video recording may indicate that asituation of interest is occurring around the user 92 and actionreporting in response to manual starting may be an alert to the otherresponder to be aware of the situation.

The method 500 then proceeds to terminal A. One of ordinary skill in theart will recognize that the actions described in blocks 520-524 are notblocking steps. Instead, the method 500 may return to terminal A uponreceiving a signal indicating an auditable event (as described in block508) even while the actions described in blocks 520-524 are beingexecuted (or are awaiting execution).

FIG. 5C is a flowchart that illustrates an exemplary embodiment of aprocedure for transmitting recorded data to an evidence managementsystem according to various aspects of the present disclosure. Theprocedure 800 is an example of a procedure suitable for use in block 530of FIG. 5B, though other procedures may also be suitable. From a startblock, the procedure 800 advances to block 802, where the audit trailreporting engine 212 determines at least one auditable event entry (suchas an event received from a computer-aided dispatch system 101) thatindicates an event for which recorded data should be uploaded. In someembodiments, the audit trail reporting engine 212 may search the audittrail data store 216 for auditable event entries that indicate eventsreceived from the computer-aided dispatch system 101. In someembodiments, such auditable event entries may be stored by the auditablecamera 106 in some data store other than the audit trail data store 216.

In some embodiments, the auditable camera 106 may have been recordingvideo data, audio data, or other data to be transmitted to the evidencemanagement system 102 while the auditable event entries that indicateevents for which recorded data should be uploaded were created. Forexample, the auditable camera 106 may be continuously recording videodata and/or audio data when the long-range wireless interface 226receives event information transmitted by the computer-aided dispatchsystem 101 and causes corresponding auditable event entries to becreated. As another example, the auditable camera 106 may becontinuously recording video data and/or audio data when a button pressis detected, a short-range wireless signal is received, or some otheraction occurs that causes an auditable event entry to be created thatindicates an event for which recorded data should be uploaded.

In some embodiments, the auditable camera 106 may have completed itsrecording of video data and/or audio data, and may receive eventinformation after the fact that indicates that one or more eventsoccurred while the video data and/or audio data was being recorded. Forexample, the auditable camera 106 may receive event information from thecomputer-aided dispatch system 101 when it is connected to the evidencecollection dock 104 in order to upload the recorded data to the evidencemanagement system 102. As another example, the auditable camera 106 mayreceive event information from a coordinator computing device 107 thatis entered by a user 92 after the fact. In such an example, theauditable camera 106 may be recording data continuously, and after anevent occurs the user 92 may enter information into the coordinatorcomputing device 107 indicating the time of the event.

While the above examples describe receiving information from thecomputer-aided dispatch system 101, it is to be noted that in someembodiments the information may be received directly by the auditablecamera 106 from the computer-aided dispatch system 101 via a long-rangewireless connection (or via the evidence collection dock 104), while inother embodiments the information may be transmitted from thecomputer-aided dispatch system 101 to the evidence management system 102and/or the coordinator computing device 107, and then from the evidencemanagement system 102 and/or the coordinator computing device 107 to theauditable camera 106. It is also to be noted that while receivinginformation from a computer-aided dispatch system 101 is described, someembodiments may receive event information from another source, such as arecords management system 404, in ways similar to those described abovefor computer-aided dispatch information.

At block 804, the audit trail reporting engine 212 marks one or moreportions of recorded data in the video data store 222 and/or the audiodata store 224 based on the determined at least one auditable evententry. In some embodiments, a single auditable event entry may indicateboth a start time for an event and an end time for an event. In someembodiments, a first auditable event entry may indicate a start time foran event, and a second auditable event entry may indicate an end timefor the event. In some embodiments, the audit trail reporting engine 212may mark a portion of the recorded data that lies between the start timefor the event and the end time for the event indicated by one or moreauditable event entries. In some embodiments, the audit trail reportingengine 212 may mark a portion of the recorded data that lies outside ofthe start time for the event and/or the end time for the event asindicated by one or more auditable event entries. For example, the audittrail reporting engine 212 may be configured to create a pre-eventbuffer by marking a start of the event in the recorded data as occurringa predetermined amount of time (such as thirty seconds) before the eventstart time indicated by the auditable event entry. As another example,the audit trail reporting engine 212 may be configured to create apost-event buffer by marking an end of the event in the recorded data asoccurring a predetermined amount of time (such as thirty seconds) afterthe event end time indicated by the auditable event entry. In someembodiments, the audit trail reporting engine 212 may be configured tocreate a pre- or post-event buffer for a first set of recorded data(such as video data), but to not create a pre- or post-event buffer fora second set of recorded data (such as audio data).

As understood by one of ordinary skill in the art, “marking” the portionof recorded data may be performed using any suitable technique,including but not limited to creating records indicating marked portionsof recorded data in a data structure separate from the recorded data;creating records within metadata associated with the recorded data;setting a flag or other indicator in metadata associated with portionsof the recorded data; and/or any other suitable technique.

The procedure 800 then advances to a for loop defined between a for loopstart block 806 and a for loop end block 814, wherein each markedportion of the recorded data is processed. From the for loop start block806, the procedure 530 advances to block 808, where the auditable camera106 transmits the marked portion of recorded data to the evidencemanagement system 102. As discussed above, the transmission may takeplace via the physical dock interface 232, the short-range wirelessinterface 228, or the long-range wireless interface 226. In someembodiments, the auditable camera 106 may transmit the marked portion ofrecorded data, and may refrain from transmitting portions of therecorded data that are not marked. One advantage of such embodiments isthat the time and computing power required for processing the unmarkedportions of data for transfer will not be wasted. In some embodiments,the auditable camera 106 may transmit all of the recorded data, and theevidence management system 102 may compare the recorded data to theevent markings (or information received by the evidence managementsystem 102 directly from a computer-aided dispatch system 402 or recordsmanagement system 404) in order to determine portions of the recordeddata to be saved in a video data store 412, an audio data store 414, orsome other data store. One advantage of such embodiments is that allrecorded data will at some point be transmitted to the evidencemanagement system 102. In either type of embodiment, the evidencemanagement system 102 can correlate the marked portions of recorded datawith event information obtained from the computer-aided dispatch system402 or records management system 404.

Next, at block 810, the auditable camera 106 receives an acknowledgementfrom the evidence management system 102 that the marked portion ofrecorded data was properly received and stored. In some embodiments, theevidence management system 102 may compute a hash or other value basedon the received recorded data, and transmits the value to the auditablecamera 106 as part of the acknowledgement. The auditable camera 106 canthen compute the hash or other value based on its own copy of therecorded data to determine whether the recorded data was successfullyreceived by the evidence management system 102 without errors. Theacknowledgement can be received by the auditable camera 106 from theevidence management system 102 via any suitable communication path, suchas the communication paths discussed above that are used to transmit therecorded information from the auditable camera 106 to the evidencemanagement system 102.

At block 812, the auditable camera 106 records an indication that themarked portion of recorded data is ready for deletion. In someembodiments, the auditable camera 106 may delete the marked portion ofrecorded data at this point. In some embodiments, the auditable camera106 may store the indication that the marked portion of recorded data isready for deletion, and then later delete all of the recorded data atonce upon determining that ready for deletion indications have beenstored for all of the marked portions of recorded data.

The procedure 530 then advances to the for loop end block 814. Iffurther marked portions of recorded data remain to be processed, theprocedure 530 returns to the for loop start block 806 and processes thenext marked portion of recorded data. Otherwise, the procedure 530advances from the for loop end block 814 to an end block, where itterminates.

FIG. 6 is a flowchart that illustrates an exemplary embodiment of amethod of managing collected audit trail data according to variousaspects of the present disclosure. From a start block, the method 600proceeds to block 602, where a data gathering engine 418 of an evidencemanagement system 102 receives one or more auditable event entriesgenerated by an auditable device such as an auditable camera 106, anauditable weapon 108, and/or the like. The auditable event entries maybe received via the evidence collection dock 104 as described in blocks526-530 of the method 500, or could be received via the coordinatorcomputing device 107 as described in blocks 520-524 of the method 500.

At block 604, the data gathering engine 418 stores the auditable evententries in an audit trail data store 416 of the evidence managementsystem 102. At block 606, the data gathering engine 418 receives one ormore device data files generated by the auditable device, and storesthem in one or more device data stores of the evidence management system102. For example, video data may be stored in a video data store 412,and audio data may be stored in an audio data store 414. In someembodiments, the video data and audio data may be stored in the samedata store. In some embodiments, data in the video data store 412 and inthe audio data store 414 may be stored separately, but may include linksor other associations to each other so that may be treated as a singleunit. The device data files may be received using actions such as thosedescribed in block 530 of the method 500.

At block 608, the data gathering engine 418 determines one or moreauditable event entries from the audit trail data store 416 that shouldhave matching device data files in the device data stores but do not.For example, an urgent event may have been received and stored in theaudit trail data store 416 indicating a start recording event, but novideo file associated with the event is found in the video data store222. This determination can help find situations where vital evidence ismissing but could still be uploaded. This determination can also provideproof that all existing videos associated with an auditable camera 106are present within the evidence management system 102. At block 610, auser interface engine 420 of the evidence management system 102generates alerts based on auditable event entries having missingmatching device data files. These auditable event entries are thosefound in the block 606. In some embodiments, the alerts may includeemail or text message upload reminders sent to the user 92 associatedwith the appropriate auditable device, or to the user's supervisor. Insome embodiments, the alerts may include a report presented as a webpage (or in another format) of all missing device data files for a groupof devices or for a period of time.

At block 612, the user interface engine 420 retrieves information from arecords management system 404 describing an incident and generates atimeline presentation of auditable events associated with the incident.The information about the incident may include, but is not limited to: astart time and an end time of the incident; one or more geographiclocations associated with the incident; one or more users 92 associatedwith the incident; and one or more auditable devices associated withsaid users 92. The information about the incident may be used to findrelevant auditable event entries in the audit trail data store 416. Theuser interface engine 420 queries the audit trail data store 416 to findthe relevant auditable event entries, and places indications of theauditable events on the timeline. In the timeline presentation,interacting with an auditable event indication or a portion of thetimeline (such as clicking or tapping on the indication or a portion ofthe timeline) may cause data associated with the auditable event, suchas event detail information, and/or associated data stored in the videodata store 412 and/or the audio data store 414 to be presented.

At block 614, the user interface engine 420 generates one or more alertsbased on auditable event entries from the audit trail data store 416that indicate errors with an auditable device. In some embodiments, thealerts could be an email or SMS message transmitted to the user 92associated with the auditable device. In some embodiments, the alertscould be displayed in a summary list of errors from all devices managedby a given technical support professional or a given agency. In someembodiments, the auditable device data store 410 may be queried todetermine a location or contact information of the associated user 92 inorder to deliver the alert.

At block 616, the user interface engine 420 generates a summarypresentation of auditable events that indicate errors across multipleauditable devices of a matching type. For example, a summarypresentation may present all battery faults for all auditable cameras,regardless of user. This summary presentation may be presented toinformation technology management at the agency operating the auditabledevices, or may be aggregated for multiple agencies and viewed by theproprietor of the evidence management system 102 and/or the developer ofthe auditable devices to improve engineering processes or to updatefuture versions of the auditable devices.

The method 600 then proceeds to an end block and terminates. One ofordinary skill in the art will recognize that the steps of method 600are presented as ordered for sake of discussion only. In someembodiments, the steps may be performed in any order, repeatedly, inparallel, and/or the like. Though it is clear that the data gatheringsteps would happen at some point before the presentation steps happenfor the first time, it is still possible that the presentation stepscould happen multiple times for a single execution of the data gatheringstep, or that the data gathering steps could happen without thepresentation steps occurring.

FIG. 7 is a block diagram that illustrates aspects of an exemplarycomputing device 700 appropriate for use as a computing device of thepresent disclosure. While multiple different types of computing deviceswere discussed above, the exemplary computing device 700 describesvarious elements that are common to many different types of computingdevices. While FIG. 7 is described with reference to a computing devicethat is implemented as a device on a network, the description below isapplicable to servers, personal computers, mobile phones, smart phones,tablet computers, embedded computing devices, and other devices that maybe used to implement portions of embodiments of the present disclosure.Moreover, those of ordinary skill in the art and others will recognizethat the computing device 700 may be any one of any number of currentlyavailable or yet to be developed devices.

In its most basic configuration, the computing device 700 includes atleast one processor 702 and a system memory 704 connected by acommunication bus 706. Depending on the exact configuration and type ofdevice, the system memory 704 may be volatile or nonvolatile memory,such as read only memory (“ROM”), random access memory (“RAM”), EEPROM,flash memory, or similar memory technology. Those of ordinary skill inthe art and others will recognize that system memory 704 typicallystores data and/or program modules that are immediately accessible toand/or currently being operated on by the processor 702. In this regard,the processor 702 may serve as a computational center of the computingdevice 700 by supporting the execution of instructions.

As further illustrated in FIG. 7, the computing device 700 may include anetwork interface 710 comprising one or more components forcommunicating with other devices over a network. Embodiments of thepresent disclosure may access basic services that utilize the networkinterface 710 to perform communications using common network protocols.The network interface 710 may also include a wireless network interfaceconfigured to communicate via one or more wireless communicationprotocols, such as WiFi, 2G, 3G, LTE, WiMAX, Bluetooth, Bluetooth lowenergy, and/or the like. As will be appreciated by one of ordinary skillin the art, the network interface 710 illustrated in FIG. 7 mayrepresent one or more wireless interfaces or physical communicationinterfaces described and illustrated above with respect to particularcomponents of the system 100.

In the exemplary embodiment depicted in FIG. 7, the computing device 700also includes a storage medium 708. However, services may be accessedusing a computing device that does not include means for persisting datato a local storage medium. Therefore, the storage medium 708 depicted inFIG. 7 is represented with a dashed line to indicate that the storagemedium 708 is optional. In any event, the storage medium 708 may bevolatile or nonvolatile, removable or nonremovable, implemented usingany technology capable of storing information such as, but not limitedto, a hard drive, solid state drive, CD ROM, DVD, or other disk storage,magnetic cassettes, magnetic tape, magnetic disk storage, and/or thelike.

As used herein, the term “computer-readable medium” includes volatileand non-volatile and removable and non-removable media implemented inany method or technology capable of storing information, such ascomputer readable instructions, data structures, program modules, orother data. In this regard, the system memory 704 and storage medium 708depicted in FIG. 7 are merely examples of computer-readable media.

Suitable implementations of computing devices that include a processor702, system memory 704, communication bus 706, storage medium 708, andnetwork interface 710 are known and commercially available. For ease ofillustration and because it is not important for an understanding of theclaimed subject matter, FIG. 7 does not show some of the typicalcomponents of many computing devices. In this regard, the computingdevice 700 may include input devices, such as a keyboard, keypad, mouse,microphone, touch input device, touch screen, tablet, and/or the like.Such input devices may be coupled to the computing device 700 by wiredor wireless connections including RF, infrared, serial, parallel,Bluetooth, Bluetooth low energy, USB, or other suitable connectionsprotocols using wireless or physical connections. Similarly, thecomputing device 700 may also include output devices such as a display,speakers, printer, etc. Since these devices are well known in the art,they are not illustrated or described further herein.

While illustrative embodiments have been illustrated and described, itwill be appreciated that various changes can be made therein withoutdeparting from the spirit and scope of the invention.

What is claimed is:
 1. An auditable camera, comprising: a video sensor;an audit trail data store; a video data store; and a network interface,wherein the auditable camera is configured to perform actions forprocessing recorded data for storage, the actions comprising: recordingvideo data captured via the video sensor; storing the recorded videodata within the video data store; receiving a signal indicating anauditable event; responsive to receiving the signal indicating theauditable event, creating an auditable event entry in the audit traildata store, the auditable event entry comprising information associatedwith the auditable event; marking at least one subset of the recordedvideo data based on the auditable event indicated by the signal;determining the auditable event comprises an urgent event; responsive todetermining the auditable event comprises the urgent event, transmittingthe auditable event entry via the network interface to a remotecomputing device; in accordance with the marking, uploading the at leastone subset of the recorded video data to an evidence management system;and in accordance with the marking, refraining from transmitting anunmarked portion of the recorded video data, wherein the auditable evententry is transmitted before the at least one subset of video data isuploaded.
 2. The auditable camera of claim 1, wherein the auditablecamera comprises a wearable camera.
 3. The auditable camera of claim 1,wherein the information associated with the auditable event comprises aunique identifier of the at least one subset of the recorded video. 4.The auditable camera of claim 1, wherein the actions further comprise:receiving a second signal indicating a second auditable event;responsive to receiving the second signal indicating the secondauditable event, creating a second auditable event entry in the audittrail data store, the second auditable event entry comprisinginformation associated with the second auditable event; determining thesecond auditable event comprises a non-urgent event; responsive todetermining the second auditable event comprises the non-urgent event,deferring transmission of the second auditable event entry to theevidence management system until the auditable camera has been placedinto an evidence collection dock.
 5. The auditable camera of claim 1,wherein the signal is received by the auditable camera while the videodata is recorded or after the video data is recorded by the auditablecamera.
 6. The auditable camera of claim 5, wherein the networkinterface comprises a long-range wireless interface and transmitting theauditable event entry comprises transmitting the auditable event entryvia the long-range wireless interface.
 7. The auditable camera of claim6, further comprising a second network interface different from thelong-range wireless interface, wherein uploading the at least one subsetof the recorded video data comprises uploading the at least one subsetof the recorded video data via the second network interface.
 8. Theauditable camera of claim 7, wherein the second network interfacecomprises a physical dock interface.
 9. The auditable camera of claim 1,wherein the network interface comprises a short-range wireless interfaceand receiving the signal comprises receiving the signal via theshort-range wireless interface while the video data is recorded.
 10. Theauditable camera of claim 1, wherein: the network interface comprises along-range wireless interface; receiving the signal comprises receivingthe signal via the long-range wireless interface; and determining theauditable event comprises the urgent event includes determining thevideo data was automatically recorded starting in response to thereceived signal.
 11. The auditable camera of claim 1, wherein recordingthe video data includes recording the video data continuously andreceiving the signal includes receiving the signal while the video datais recorded continuously.
 12. The auditable camera of claim 1, whereinuploading the marked at least one subset of the recorded video dataincludes uploading a portion of the recorded video data that liesoutside one or more of a start time and an end time indicated by thereceived signal.
 13. The auditable camera of claim 1, wherein the urgentevent is a start recording event.
 14. The auditable camera of claim 1,further comprising a certificate data store storing one or morecertificates, wherein the actions further comprise signing the auditableevent entry using the one or more certificates prior to transmitting theauditable event entry.
 15. A system comprising: an evidence managementsystem comprising: an audit trail data store; and a first video datastore; and an auditable camera, comprising a video sensor; a secondaudit trail data store; a second video data store; and a long-rangewireless interface configured to communicate with the evidencemanagement system via at least one network, wherein the auditable camerais configured to perform actions for processing recorded data forstorage, the actions comprising: capturing video data via the videosensor; storing the video data within the second video data store;receiving a first signal indicating a first auditable event; responsiveto receiving the first signal indicating the first auditable event,creating a first auditable event entry in the second audit trail datastore, the first auditable event entry comprising information associatedwith the first auditable event; marking at least one subset of the videodata based on the first auditable event indicated by the received firstsignal; determining the first auditable event comprises an urgent event;responsive to determining the first auditable event comprises the urgentevent, transmitting the first auditable event entry via the long-rangewireless interface to the evidence management system, wherein theevidence management system is configured to store the first auditableevent entry in the first audit trail data store; in accordance with themarking, uploading the at least one subset of the video data to theevidence management system, wherein the at least one subset is less thanall of the video data stored within the second video data store, thefirst auditable event entry is transmitted before the at least onesubset of the video data is uploaded, and the evidence management systemis configured to store the at least one subset of the video data in thefirst video data store; receiving a second signal indicating a secondauditable event; responsive to receiving the second signal indicatingthe second auditable event, creating a second auditable event entry inthe second audit trail data store, the second auditable event entrycomprising information associated with the second auditable event;determining the second auditable event comprises a non-urgent event;responsive to determining the second auditable event comprises thenon-urgent event, refraining from transmitting the second auditableevent entry to the evidence management system until after a third signalindicating a third auditable event is subsequently received by theauditable camera.
 16. The system of claim 15, wherein receiving thefirst signal comprises receiving the first signal via the long-rangewireless interface from a remote computing device different from theevidence management system.
 17. The system of claim 15, wherein theurgent event does not comprise a start recording event or a stoprecording event.
 18. The system of claim 15, wherein the evidencemanagement system is configured to perform second actions comprising:retrieving, from a records management system, information describing anincident; finding relevant auditable event entries from the first audittrail data store using the information describing the incident; andgenerating a timeline presentation of auditable events associated withthe incident, wherein the relevant auditable event entries include thefirst auditable event entry and the timeline presentation comprises anindication associated with the at least one subset of the video data.19. A method performed by an auditable camera for processing recordeddata for storage, the method comprising: recording video data capturedvia a video sensor of the auditable camera; storing the video datawithin a video data store of the auditable camera; receiving a firstsignal indicating a first auditable event; responsive to receiving thefirst signal indicating the first auditable event, creating a firstauditable event entry in an audit trail data store of the auditablecamera; determining the first auditable event comprises an urgent event;responsive to determining the first auditable event comprises the urgentevent, transmitting the first auditable event entry via a long-rangewireless interface of the auditable camera to a remote computing device;associating the first auditable event entry with the video data, whereinthe associating comprises storing a unique identifier of the video datain the first auditable event entry; uploading the video data to theremote computing device via the long-range wireless interface, whereinthe first auditable event entry is transmitted before the video data isuploaded; receiving a second signal indicating a second auditable event;responsive to receiving the second signal indicating the secondauditable event, creating a second auditable event entry in the audittrail data store, the second auditable event entry comprisinginformation associated with the second auditable event; determining thesecond auditable event comprises a non-urgent event; responsive todetermining the second auditable event comprises the non-urgent event,refraining from transmitting the second auditable event entry to theremote computing device until after a third signal indicating a thirdauditable event is subsequently received by the auditable camera. 20.The method of claim 19, wherein: receiving the first signal comprisesreceiving the first signal via the long-range wireless interface from aremote dispatch computing device; recording the video data comprisesautomatically starting the recording in response to the received firstsignal; and determining the first auditable event comprises the urgentevent comprises determining the recording was automatically started inresponse to the first signal received from the remote dispatch computingdevice.