Video blurring in a secure environment

ABSTRACT

Methods and systems for video blurring in a secure environment are described. In one embodiment, the method includes receiving video at a video visitation device in a secure environment, adjusting a depth of field parameter for the video, such that an image of a first object at a first distance from the video visitation device is in focus and an image of a second object at a second distance from the video visitation device is blurred, and providing the video to a viewing device located outside of the secure environment.

BACKGROUND

The introduction of video services into inmate housing and common arealocations for the purposes of video visitation and/or video calling hasintroduced an unanticipated issue related to what details are conveyedthrough the video to whoever is viewing it at the other end. Inmatehousing environments simply were not designed with the expectation thatthose outside the facility would have a camera inside the housing units.As such, back ground details could include showers, bathrooms, interiorsof cells, or just the general population going about their day.Additionally, other inmates who know they are on camera often act up andcause disruptions which can escalate and become safety issues.

In prior systems, the camera component of the video visitation/callsystem reveals more than is intended and much more than is desired. Ameans of not showing what is happening behind inmates participating invideo visitations/calls is needed in order to safe guard the privacy andpromote the safe use of video services provided within inmate housingareas.

Given the infancy of the use of video services within the correctionalinstitution setting, previous methods of resolving the issue resorted toplacing the video terminals outside of the general inmate population.This is undesirable as it negates one of the prime advantages of videovisitations; namely, to provide visitations without having the securityand administrative issues associated with moving inmates from housinglocations to visitation locations.

One alternative solution is to design the housing units in such a waythat the video terminals face an innocent area. This is impracticalsince most correctional institutions were constructed decades before andreconstruction would be too costly. Also, such floor plan designs willtend to rely on designing “nooks” to house the video services but such“nooks” are difficult for correctional officers to monitor and thusprovide locations for violent and/or illicit activities to take place.

One previous technology uses facial recognition to “lock in” on thefacial features of the inmate and blur everything but those features.This approach suffers as the inmate moves around and has thedisadvantage of blurring much of the face and or torso of the inmatethus leading to an unsatisfactory visitation experience.

SUMMARY

Methods and systems for video blurring in a secure environment aredescribed. In one embodiment, the method includes receiving video at avideo visitation device in a secure environment, adjusting a depth offield parameter for the video, such that an image of a first object at afirst distance from the video visitation device is in focus and an imageof a second object at a second distance from the video visitation deviceis blurred, and providing the video to a viewing device located outsideof the secure environment.

In on embodiment, adjusting the depth of field parameter may includeadjusting an f-stop setting of a camera associated with the videovisitation device. Adjusting the f-stop setting may further includeadjusting a focal length of a lens coupled to the video visitationdevice. In an embodiment, adjusting the f-stop setting includesadjusting an aperture setting of the camera associated with the videovisitation device.

In another embodiment, adjusting the depth of field parameter includesdigitally processing the video received from the video visitation devicein a video processing device to blur one or more objects at the seconddistance from the video visitation device.

In one embodiment, adjusting the depth of field parameter is remotelycontrollable by a third party. Additionally, the method may includeproviding the video to a second viewing device for security monitoring,the second viewing device being associated with a remote control deviceconfigured to allow the third party monitor to remotely control thedepth of field parameter.

Various embodiments of tangible computer readable media are described.In one embodiment, the computer readable media comprisescomputer-readable code for receiving video from a video visitationdevice in a secure environment, storing the video received from thevideo visitation device in a data storage device, adjusting a depth offield parameter for the video, such that an image of a first object at afirst distance from the video visitation device is in focus and an imageof a second object at a second distance from the video visitation deviceis blurred, and providing the adjusted video to a viewing device locatedoutside of the secure environment.

In one embodiment, adjusting the depth of field parameter furthercomprises processing the video received from the video visitation devicein a video processing device to blur one or more objects at the seconddistance from the video visitation device. Adjusting the depth of fieldparameter may be remotely controllable by a third-party monitor.

The operations performed may further include providing the video to asecond viewing device for security monitoring, the second viewing devicebeing associated with a remote control device configured to allow thethird-party monitor to remotely control the depth of field parameter. Inan embodiment, the operations include providing the video stored in thedata storage device to an investigator in response to indicia from thethird-party monitor. In still further embodiments, the operationsinclude providing the video stored in the data storage device to aninvestigator in response to a request from the investigator.

Embodiments of systems are also described. One embodiment of a systemincludes a data communication device configured to receive video from avideo visitation device in a secure environment. The system may alsoinclude a data storage device coupled to the data communication deviceand configured to store the video received from the video visitationdevice. Additionally, the system may include a data processor configuredto adjust a depth of field parameter for the video, such that an imageof a first object at a first distance from the video visitation deviceis in focus and an image of a second object at a second distance fromthe video visitation device is blurred, wherein the data communicationdevice is configured to provide the video to a viewing device locatedoutside of the secure environment.

In an embodiment, the system includes a camera controller configured toadjust an f-stop setting of a camera associated with the videovisitation device. The camera controller may be controllable by athird-party to remotely adjust the f-stop setting. Additionally, thecamera controller may be configured to adjust a focal length of a lenscoupled to the video visitation device. In an embodiment, the cameracontroller is further configured to adjust an aperture setting of thecamera associated with the video visitation device.

In one embodiment, the system includes a second viewing device forsecurity monitoring, the second viewing device being associated with aremote control device configured to allow a third-party to remotelycontrol the depth of field parameter.

The data communication device may provide the video stored in the datastorage device to an investigator in response to indicia from thethird-party. In another embodiment, the system is configured to providethe video stored in the data storage device to an investigator inresponse to a request from the investigator.

BRIEF DESCRIPTION OF THE DRAWINGS

Having thus described the invention in general terms, reference will nowbe made to the accompanying drawings, which are not necessarily drawn toscale, and wherein:

FIG. 1 is a block diagram of an environment where a visitation systemmay be employed according to some embodiments.

FIG. 2 is a diagram of a video visitation device according to someembodiments.

FIG. 3 is a block diagram illustrating one embodiment of a video cameradevice for use in a video visitation system.

FIG. 4 is a block diagram of an embodiment of a visitation system.

FIG. 5 is a block diagram of an embodiment of a video visitation device.

FIG. 6 is a block diagram of a computer system configured to implementvarious systems and methods described herein according to someembodiments.

FIG. 7 is a flowchart of an embodiment of a method for video blurring ina secure environment.

FIG. 8 is a flowchart of another embodiment method for video blurring ina secure environment.

FIG. 9 is an illustrative drawing of one embodiment of a blurred videoframe.

DETAILED DESCRIPTION

This specification discloses systems and methods for video blurring in asecure environment. Generally speaking, the various techniques describedherein may find applicability in a wide variety ofcontrolled-environment facilities. Examples of controlled-environmentfacilities may include correctional institutions or facilities (e.g.,municipal jails, county jails, state prisons, federal prisons, militarystockades, juvenile facilities, detention camps, home incarcerationenvironments, etc.), healthcare facilities (e.g., hospitals, nursinghomes, mental health facilities, rehabilitation clinics, such as drugand alcohol rehabilitation facilities, etc.), restricted living quarters(e.g., hotels, resorts, camps, dormitories, barracks, etc.), and thelike. For convenience of explanation, various examples discussed hereinare presented in the context of correctional facilities. For instance,in some of the embodiments discussed below, a controlled-environmentfacility may be referred to as a jail or prison, and its residents maybe referred to as residents, arrestees, detainees, or inmates. It shouldbe understood, however, that the systems and methods described hereinmay be similarly applicable to other types of controlled-environmentfacilities and their respective residents (e.g., a hospital and itspatients).

Turning now to FIG. 1, a block diagram of an illustrative environmentwhere a visitation system may be employed is depicted according to someembodiments. As shown, communication processing system 101 may providetelephone services, videoconferencing, online chat, and othercommunication services to a controlled-environment facility. Forexample, in some cases, communication system 101 may be co-located witha controlled-environment facility. Alternatively, communication system101 may be centrally or remotely located with respect to one or morecontrolled-environment facilities and/or may provide communicationservices to multiple controlled-environment facilities. More generally,however, it should be noted that communication system 101 may assume avariety of forms, and may be configured to serve a variety of facilitiesand/or users, whether within or outside of a controlled-environmentfacility.

In one embodiment, a hybrid system may be implemented. The hybrid systemmay include one or more centrally located components and one or morecomponents that are located on the premises of the controlled facility.For example, a data storage may be located in an off-site cloud storagefacility. In some embodiments, servers, security monitoring systems andother components described in further detail below may be located in acentral or remote facility. In embodiments of a hybrid system, othercomponents may be located within the controlled facility. For example,in some embodiments a video visitation device as described in FIGS. 2-3may be located within the controlled facility. In certain embodiments,the inmates may be able to communicate using the video visitationdevices with persons located outside of the controlled facility, whereinthe person outside of the facility uses a desktop computer, tabletcomputer, or the like. In another embodiment, the inmate may communicatewith a person located inside of the controlled facility such as avisitation area. In such an embodiment, but he inmate and the visitormay communicate using a video visitation device respectively.

In the context of a correctional facility, for instance, inmates may usevideo-enabled telephones 102 to access certain communication services.In some facilities, inmates may also use a personal computer wirelessdevice 104 to access such services. For example, an inmate may initiatetelephone services by lifting the receiver on telephone 102, at whichtime the inmate may be prompted to provide a personal identificationnumber (PIN), other identifying information or biometrics. Aninteractive voice response (IVR) unit or interactive smart device whichmay use visual keys (touchscreen or the like) (not shown) may generateand play prompt or other messages to inmates on devices 102 and/or 104.

Under the control of communication processing system 101, devices 102and 104 may be capable of connecting to a non-resident's (i.e., a personnot committed to a controlled-environment facility) telephone 106 ordevice 105 across a publicly switched telephone network (PSTN) 107. Forexample, telephone 106 may be located at a non-resident's home, inmatevisitation center, etc. Switch 108 in communication processing system101 may be used to connect calls across PSTN 107. Additionally oralternatively, the non-resident may be at telephone 109 or device 112,which is on an Integrated Services Digital Network (ISDN), Voice-over-IP(VoIP), or packet data network 110, such as, for example the Internet.Router 111 of communication system 101 is used to route data packetsassociated with a call connection to destination telephone 109.

Video visitation devices 103 a-n (each collectively referred to as“video visitation device 103”) may have video conferencing capabilitiesto enable inmates to participate in video visitation sessions withnon-residents of the correctional facility via video call, secure onlinechat, etc. For example, a non-resident party may have a personal orlaptop computer 113 with camera 114 (or a cell phone, tablet computer,etc.). In another embodiment, the non-residents may also use a separateset of video visitation devices 103 c-m. In one embodiment, thenon-resident may use a video visitation device 103 c-m outside of thefacility. In another embodiment, the non-resident may use a videovisitation device 103 c-m located in a secure area within the facility.A network connection between the parties may be established andsupported by an organization or commercial service that providescomputer services and software for use in telecommunications and/orVOIP, such as SKYPE® or by a propriety system. Additionally oralternatively, the correctional facility and/or the destination may usevideo conferencing equipment compatible with ITU H.323, H.320, H.264,and/or V.80, or other suitable standards. Generally speaking, each videovisitation device 103 may be disposed in a visitation area of thecontrolled-environment facility. As noted above, there may be objects orpersons in the environment of the video visitation which may be privateor objectionable. For example, when an inmate is conducting a videovisitation call, other inmates of the facility may exhibit objectionablebehaviors in the background of the frame captured by the videovisitation device 103. For these and other reasons, the inventor hereofhas developed various systems and methods of blurring video captured bythe video visitation devices 103, as described in more detail inconnection with FIGS. 2-6 below.

In addition to providing certain visitation and communicationoperations, communication processing system 101 may attempt to ensurethat an inmate's calls, video conferences, online chats, etc. areperformed only with non-residents whose identities, devices, emailaddresses, phone numbers, etc. are listed in that inmate's Pre-ApprovedContact (PAC) list. Each inmate's PAC list may be stored, for example,in database 115 maintained by an Administration and Management System(AMS) 116. In addition to PAC list(s), AMS 116 may also store inmate orresident profile data (RPD), as well as visitation rules applicable toeach inmate. As an example, in the context of a correctional facility,database 115 may include information such as balances for inmate trustand calling accounts, trial schedule, conviction data, criminal record,sentencing data, such as time served, time remaining to be served, andrelease date, cell and cellmate assignments, inmate restrictions andwarnings, commissary order history, telephone call history, callrecordings, known or suspected gang or criminal affiliations, known orsuspected affiliates, accomplices, or gang members; and any otherinformation that may be relevant or useful to correctional facilitystaff to house and maintain inmates.

In some embodiments, database 115 may also indicate a personalized levelof lighting that should be provided to a particular inmate during theinmate's video visitation sessions depending, for example, upon who theidentit(ies) of the inmate and/or the non-resident. Such personalizedlighting levels may be configured according to the facility's goals.

Visitation system 130 may be configured to provide, schedule, and managevisitation services to residents and non-residents of acontrolled-environment facility. To that end, visitation system 130 maybe coupled to PSTN 107 and/or network 110 in a manner similar tocommunication processing system 101 by also including one or moreswitches and/or routers (not shown). Accordingly, visitation system 130may be configured to communicate with one or more residents of thecontrolled-environment facility via devices 102-104 and with one or morenon-residents via devices 105, 106, 109, 112, and/or 113. Althoughvisitation system 130 is shown in FIG. 1 as being remotely located withrespect to communication processing system 101 and thecontrolled-environment facility, in other cases visitation system 130may be co-located with the facility and/or integrated within system 101.

In some implementations, communication system 101 may be configured toperform video visitation monitoring operations configured to monitor andor record video visitations (e.g., as video files). In scenarios wherecommunication system 101 is located within the controlled-environmentfacility, it may have direct access to AMS 116. In other embodiments,however, communication system 101 may be located remotely with respectto the controlled-environment facility, and access to AMS 116 may beobtained via a computer network such as, for example Network 110.

FIG. 2 is a diagram of a video visitation device 103. In someembodiments, device 103 may be implemented as a computer-based systemsuch as described in connection with FIG. 4. As illustrated, device 103includes display 204, camera 205, and handset 201 coupled to device 103via wire 209. Display 204 may be any suitable electronic display suchas, for example, a Liquid Crystal Display (LCD), a touchscreen display(e.g., resistive, capacitive, etc.), or the like, whereas camera 205 maybe any suitable imaging device such as, for instance, a video camera orwebcam equipped with Charge-Coupled Devices (CCDs), ComplementaryMetal-Oxide-Semiconductor (CMOS) active pixel sensors, etc. Handset 201may be similar to a traditional telephone handset including an earpieceportion (with a speaker), a handle portion, and a mouthpiece portion(with a microphone).

During a video visitation session, video visitation device 103 may beconfigured to capture a video image of an inmate to be transmitted to anon-resident using camera 205, and to display a video image of thenon-resident to the inmate using display 204. Video visitation device103 may also be configured to capture an audio signal from the inmate tobe transmitted to the non-resident using the mouthpiece portion ofhandset 201, and to provide an audio signal from the non-resident to theinmate using the earpiece portion of handset 201. Additionally oralternatively, audio received from the non-resident may be reproducedvia loudspeaker 202, and audio provided by the inmate may be capturedvia microphone 203. In some embodiments, handset holder or holster 208may be configured to allow a user to securely rest handset 201 againstdevice 103 (e.g., in its “off” position) when device 103 is not in use.Furthermore, handset holder 208 may include a mechanical orelectromechanical switch or sensor (not shown) that senses when handset201 is not resting against it (e.g. in its “on” position).

Video visitation device 103 may also include lighting device 206 andlighting sensor 207. In some embodiments, lighting device 206 mayinclude one or more incandescent light sources (e.g., bulbs, lamps,etc.), fluorescent lamps, Compact Fluorescent Lamps (CFL), Cold CathodeFluorescent Lamps (CCFL), high-intensity discharge sources,Light-Emitting Diodes (LEDs), or the like. Additionally oralternatively, lighting device 206 may include one or more adjustablelighting devices with variable intensity, brightness, luminance, color,tone, etc. Lighting or light sensor 207 may include one or more suitablesensors such as, for example, photoresistors, photodiodes, etc. Invarious implementations, camera 205 may serve as light sensor 207, andlight sensor 207 may be absent.

Furthermore, it should be noted that, outside of correctionalfacilities, video visitation device 103 may assume the form of anycomputer, tablet computer, smart phone, etc., or any other consumerdevice or appliance with videoconferencing capabilities. For example, inthe case where video visitation device 103 is a camera-enabledtelevision (or smart phone, etc.) that does not include a dedicatedlightning apparatus, the brightness of display 204 may be adjusted sothat display 204 may itself act as lighting device 206 (e.g., thebrightness of display 204 may be increased to also increase theillumination of the person(s) “watching” the teleconference through thetelevision, for example, upon detection that a video connection has beenestablished).

In the context of correctional facilities, video visitation device 103may include one or more tampering/impact resistant or hardened elementsconfigured to protect them from vandalism or otherwise destructive acts.For example, one or more of devices 202-207 may be protected by atransparent plastic or thermoplastic (e.g., Plexiglas, etc.) material.

In one embodiment, the video visitation device 103 may include a keypad210 or other user input device to allow a user to enter information. Forexample, the user may dial a telephone number associated with arecipient of a video visitation call, enter an account number forbilling purposes, or enter a Personal Identification Number (PIN) orinmate number for authentication and/or identification purposes.

FIG. 3 is a block diagram illustrating one embodiment of a video cameradevice 205 for use in a video visitation system 103. In an embodiment,the video camera device 205 may include an image sensor 301. Forexample, the image sensor may be configured to capture a sequence ofimages suitable for generating video. One of ordinary skill willrecognize that there are many different image sensors 301 which may beused according to the present embodiments, including Charge-CoupledDevices (CCDs) or Complimentary Metal-Oxide-Semiconductor (CMOS) imagesensors.

In an embodiment, an arrangement of one or more lenses 303 and/or anaperture mechanism 302 may be coupled to the image sensor 301. Forexample, a first lens 303 a and a second lens 303 b may be used to set afocal length of the camera device 205. The focal length may be adjustedby adjusting a distance between the first lens 303 a and the second lens303 b. The aperture mechanism 302 may be adjusted to change the aperturethrough which light passes to the image sensor 301. The depth of fieldof the camera 205 may be adjusted by either changing the focal length byadjusting the lenses 303 a,b or by adjusting the aperture size byadjusting the aperture mechanism 302. In general, the ratio of the focallength set by the lenses 303 a and/or 303 b to the aperture size isreferred to as the f-stop or relative aperture of the camera system 205.The depth of field is the distance between the nearest and farthestobjects in a scene that appear acceptably sharp in an image. The depthof field may be manipulated by adjustment of the f-stop of the camerasystem 205 or through digital processing techniques.

In such an embodiment, the depth of field of the camera system 205 maybe adjusted such that a first object 304 positioned at a first distance306 from the image sensor 301 may be in focus, while a second image 305positioned at a second distance 307 or greater may be blurred. Thelenses 303 a-b and/or the aperture mechanism 302 may be adjusted toincrease or decrease the depth of field of the camera system such thatboth the first object 304 and the second object 305 are in focus at afirst setting, or such that only the first object 304 is in focus at asecond setting, or such that only the second object is in focus at athird setting.

FIG. 4 is a block diagram of an embodiment of the visitation system 130.In one embodiment, the visitation system 130 may include a communicationdevice 401, an image processor 402, data storage device 403, and acamera controller 404. The communication device 401 may be configured toreceive video from the video visitation devices 102, 103, and/or 104.Additionally, the communication device 401 may be configured tocommunicate video to a remote device, such as computer 113,non-resident's telephone 106 or 105 or smartphone device 112. In aparticular embodiment, the remote device is located outside of thesecure environment. For example, the communication device 401 may beconfigured to communicate the video to family or friends requestingaccess to video visitation with an inmate in the secure facility.

The video received from the video visitation device 103 may be stored inthe data storage device 403. In such an embodiment, the received videomay be stored for evidence of a crime, for review by a counselor, forreview by an investigator, or for any other reason. In one embodiment,the visitation system 130 may be configured to provide the originalvideo stored in the data storage device 403 to an investigator inresponse to a request from the investigator. In another embodiment, athird party, such as a security officer, investigator, facilityadministrator, or counselor may monitor the video as it is received, andtag or flag certain portions of the received video in a database storedin the data storage device 403 in association with the video for furtherreview by the investigator, counselor, or the like.

The image processor 402 may be configured to change certain parametersof the video received from the video visitation device 103 such thatportions of the video frames are blurred. In one embodiment, certainsets of frames associated with inappropriate conduct may be censored andblurred before sending them to the remote device. In another embodiment,a background portion of received video frames may be blurred orotherwise obscured. In still another embodiment, a selectable portion ofvideo frames may be blurred or otherwise obscured in response to aselection by a censor or security officer. For example, if a securityofficer reviewing the video identifies that inappropriate conduct istaking place in view of the video visitation device 103, then the censoror security officer may select a portion of the video frames by dragginga box, circle, or other shape around a portion to be blurred. In anotherembodiment, the censor or security officer may provide indiciaindicating that the entire background of a portion of video is to beblurred. In various embodiments discussed with relation to FIG. 6, thevisitation system 130 may include or be associated with hardware andsoftware devices suitable for allowing a monitor, censor, or securityofficer to review video and enter inputs for censoring, blurring, orotherwise obscuring portions of video received by the video visitationdevice 103. In certain embodiments, image processor 402 may digitallyedit or modify the received video to blur or otherwise obscure thereceived video before sending it to the remote device. In these variousembodiments, the image processor 402 may blur the image according to ablurring factor which may be preset or set by a user. The blurringfactor may be a setting used to determine how much objects in the videowill be blurred or obscured.

In one embodiment, the visitation system 130 may include a cameracontroller 404 which may also be used to blur the video. In such anembodiment, the camera controller 404 may communicate commands to a lensmechanism 303 a,b and/or to an aperture mechanism 302 for controllingthe depth of field of the camera 205, and thereby blurring portions ofimages captured by the camera 205. In another embodiment, the cameracontroller 404 may communicate commands to a secondary camera control505 as described in FIG. 5. The secondary camera control 505 may beincluded in the video visitation device 103. In certain embodiments, amonitor, censor, or security officer reviewing the video may enter aninput indicating that the camera 205 should blur a portion of the video.In such an embodiment, the camera controller 404 may issue a command toadjust the lens 303 and/or the aperture mechanism 302.

FIG. 5 is a block diagram of software configurable to run on a videovisitation device 130. The communication device 501 may be configured tocommunicate video to the visitation system 130. The communication device501 may also receive video control commands from the visitation system130. For example, the camera controller 404 on the visitation system 130may issue a command to blur a background portion of the video. Thecommunication device 501 may receive the command and relay it to thecamera control 505. The camera control 505 may include a lens control506 configured to adjust the focal length of the lenses 303 a,b.Additionally, the camera control 505 may include an aperture control 507configured to adjust an aperture diameter of the aperture mechanism 302.Accordingly, through adjustment of the focal length and or the aperture,the depth of field of the camera system 205 may be adjusted, therebyblurring some objects in the image while keeping other objects in focus.

FIG. 6 is a schematic block diagram illustrating one embodiment of acomputer system 600 configurable for video blurring in a secureenvironment. In one embodiment, the video visitation device 130 and/orthe visitation system 130 may be implemented on a computer systemsimilar to the computer system 600 described in FIG. 6. Similarly, theremote devices, such as laptop 113 may be implemented on a computersystem similar to the computer system 600 described in FIG. 6. Invarious embodiments, computer system 600 may be a server, a mainframecomputer system, a workstation, a network computer, a desktop computer,a laptop, or the like.

As illustrated, computer system 600 includes one or more processors601A-N coupled to a system memory 602 via bus 603. Computer system 600further includes network interface 604 coupled to bus 603, andinput/output (I/O) controller(s) 605, coupled to devices such as cursorcontrol device 606, keyboard 607, and display(s) 608. In one embodiment,the I/O controller(s) 605 may be coupled to a camera 205. In someembodiments, a given entity (e.g., video visitation device 103) may beimplemented using a single instance of computer system 600, while inother embodiments multiple such systems, or multiple nodes making upcomputer system 600, may be configured to host different portions orinstances of embodiments (e.g., visitation system 130).

In various embodiments, computer system 600 may be a single-processorsystem including one processor 601A, or a multi-processor systemincluding two or more processors 601A-N(e.g., two, four, eight, oranother suitable number). Processor(s) 601A-N may be any processorcapable of executing program instructions. For example, in variousembodiments, processor(s) 601A-N may be general-purpose or embeddedprocessors implementing any of a variety of instruction setarchitectures (ISAs), such as the x86, POWERPC®, ARMO, SPARC®, or MIPS®ISAs, DSP's (digital signal processor) or any other suitable ISA. Inmulti-processor systems, each of processor(s) 601A-N may commonly, butnot necessarily, implement the same ISA. Also, in some embodiments, atleast one processor(s) 601A-N may be a graphics processing unit (GPU) orother dedicated graphics-rendering device.

System memory 602 may be configured to store program instructions and/ordata accessible by processor(s) 601A-N. For example, memory 602 may beused to store software program and/or database shown in FIGS. 7-8. Invarious embodiments, system memory 602 may be implemented using anysuitable memory technology, such as static random access memory (SRAM),synchronous dynamic RAM (SDRAM), nonvolatile/Flash-type memory, or anyother type of memory. As illustrated, program instructions and dataimplementing certain operations, such as, for example, those describedabove, may be stored within system memory 602 as program instructions609 and data storage 660, respectively. In other embodiments, programinstructions and/or data may be received, sent or stored upon differenttypes of computer-accessible media or on similar media separate fromsystem memory 602 or computer system 600. Generally speaking, acomputer-accessible medium may include any tangible, non-transitorystorage media or memory media such as electronic, magnetic, or opticalmedia—e.g., disk or CD/DVD-ROM coupled to computer system 600 via bus603, or non-volatile memory storage (e.g., “flash” memory)

The terms “tangible” and “non-transitory,” as used herein, are intendedto describe a computer-readable storage medium (or “memory”) excludingpropagating electromagnetic signals, but are not intended to otherwiselimit the type of physical computer-readable storage device that isencompassed by the phrase computer-readable medium or memory. Forinstance, the terms “non-transitory computer readable medium” or“tangible memory” are intended to encompass types of storage devicesthat do not necessarily store information permanently, including forexample, random access memory (RAM). Program instructions and datastored on a tangible computer-accessible storage medium innon-transitory form may further be transmitted by transmission media orsignals such as electrical, electromagnetic, or digital signals, whichmay be conveyed via a communication medium such as a network and/or awireless link.

In an embodiment, bus 603 may be configured to coordinate I/O trafficbetween processor 601, system memory 602, and any peripheral devicesincluding network interface 604 or other peripheral interfaces,connected via I/O controller(s) 605. In some embodiments, bus 603 mayperform any necessary protocol, timing or other data transformations toconvert data signals from one component (e.g., system memory 602) into aformat suitable for use by another component (e.g., processor(s)601A-N). In some embodiments, bus 603 may include support for devicesattached through various types of peripheral buses, such as a variant ofthe Peripheral Component Interconnect (PCI) bus standard or theUniversal Serial Bus (USB) standard, for example. In some embodiments,the operations of bus 603 may be split into two or more separatecomponents, such as a north bridge and a south bridge, for example. Inaddition, in some embodiments some or all of the operations of bus 603,such as an interface to system memory 602, may be incorporated directlyinto processor(s) 601A-N.

Network interface 604 may be configured to allow data to be exchangedbetween computer system 600 and other devices, such as other computersystems attached to visitation system 130, for example. In variousembodiments, network interface 604 may support communication via wiredor wireless general data networks, such as any suitable type of Ethernetnetwork, for example; via telecommunications/telephony networks such asanalog voice networks or digital fiber communications networks; viastorage area networks such as Fiber Channel SANs, or via any othersuitable type of network and/or protocol.

I/O controller(s) 605 may, in some embodiments, enable connection to oneor more display terminals, keyboards, keypads, touch screens, scanningdevices, voice, camera, or optical recognition devices, or any otherdevices suitable for entering or retrieving data by one or more computersystem 600. Multiple input/output devices may be present in computersystem 600 or may be distributed on various nodes of computer system600. In some embodiments, similar I/O devices may be separate fromcomputer system 600 and may interact with computer system 600 through awired or wireless connection, such as over network interface 604.

As shown in FIG. 6, memory 602 may include program instructions 609,configured to implement certain embodiments described herein, and datastorage 610, comprising various data accessible by program instructions609. In an embodiment, program instructions 609 may include softwareelements of embodiments illustrated in FIGS. 7-8. For example, programinstructions 609 may be implemented in various embodiments using anydesired programming language, scripting language, or combination ofprogramming languages and/or scripting languages. Data storage 610 mayinclude data that may be used in these embodiments such as, for example,visitation system 130. In other embodiments, other or different softwareelements and data may be included.

A person of ordinary skill in the art will appreciate that computersystem 600 is merely illustrative and is not intended to limit the scopeof the disclosure described herein. In particular, the computer systemand devices may include any combination of hardware or software that canperform the indicated operations. In addition, the operations performedby the illustrated components may, in some embodiments, be performed byfewer components or distributed across additional components. Similarly,in other embodiments, the operations of some of the illustratedcomponents may not be performed and/or other additional operations maybe available. Accordingly, systems and methods described herein may beimplemented or executed with other computer system configurations.

Embodiments of visitation system 130 described in FIG. 4 and/or videovisitation device 103 described in FIG. 1 may be implemented in acomputer system that is similar to computer system 600. In oneembodiment, the elements described in FIG. 1 may be implemented indiscrete hardware modules. Alternatively, the elements may beimplemented in software-defined modules which are executable by one ormore of processors 601A-N, for example.

FIG. 7 is a flowchart of an embodiment of a method 700 for videoblurring in a secure environment. In one embodiment, the method 700starts when the video visitation device 103 in the secure environment100 receives 701 video. For example, the camera 205 of the videovisitation device 103 may capture video of an inmate. The camera control505 may adjust 702 a depth of field parameter for the video such thatthe first object 304 at a first distance 306 is in focus and the secondobject 305 at the second distance 307 is blurred. The communicationdevice 501 may then provide 703 the video to a viewing device, such ascomputer 113, located outside of the secure environment.

FIG. 8 is a flowchart of another embodiment method 800 for videoblurring in a secure environment. In one embodiment, the visitationsystem 130 may receive 801 video from a video visitation device 103located in a secure environment. The visitation system 130 may thenstore 802 the video received 801 from the video visitation device 103 ina data storage device 403. Thereafter, the camera controller 404 mayadjust 803 a depth of field parameter for the video such that the firstobject 304 at a first distance 306 is in focus and the second object 305at the second distance 307 is blurred. Alternatively, the imageprocessor 402 may adjust 403 a depth of field parameter or otherwiseblur or obscure a portion of the video. The communication device 401 maythen provide 804 the processed video to a viewing device located outsideof the secure environment.

FIG. 9 is an illustrative drawing of one embodiment of a blurred videoframe 900. As illustrated, the first object 304 may be a face 901. Thesecond object 305 may be anything located at a predefined distance fromthe face 901, for example in the background 902 which is blurred. Insuch an embodiment, the face 901 may be able to move within the depth offield of the camera 205 without artifacts associated with facialrecognition, but all objects located outside of the depth of field, forexample in the background 902, will be blurred or obscured. In certainembodiments, a maximum depth of field may be set and predefined for aspecific camera. For example, a camera 205 may be placed in front of anentrance to a restroom or shower room. In such an embodiment, themaximum depth of field may be set to a very shallow distance to ensurethat objects or persons entering the restroom or shower room are blurredor otherwise obscured, while still allowing the person whose face islocated within the depth of field to be in focus. For example, as shownin FIG. 9, a second inmate in the background 902 may have blurredfeatures to maintain the privacy of the second inmate 903. In a furtherembodiment, the second inmate 903 may be so obscured that his actions ordemeanor are also blurred and obscured.

The foregoing has outlined rather broadly the features and technicaladvantages of the present invention in order that the detaileddescription of the invention that follows may be better understood.Additional features and advantages of the invention will be describedhereinafter which form the subject of the claims of the invention. Itshould be appreciated that the conception and specific embodimentdisclosed may be readily utilized as a basis for modifying or designingother structures for carrying out the same purposes of the presentinvention. It should also be realized that such equivalent constructionsdo not depart from the invention as set forth in the appended claims.The novel features which are believed to be characteristic of theinvention, both as to its organization and method of operation, togetherwith further objects and advantages will be better understood from thefollowing description when considered in connection with theaccompanying figures. It is to be expressly understood, however, thateach of the figures is provided for the purpose of illustration anddescription only and is not intended as a definition of the limits ofthe present invention.

What is claimed is:
 1. A method, comprising: receiving video at a videovisitation device in a secure environment; adjusting a depth of fieldparameter for the video, such that an image of a first object at a firstdistance from the video visitation device is in focus and an image of asecond object at a second distance from the video visitation device isblurred; and providing the video to a viewing device located outside ofthe secure environment.
 2. The method of claim 1, wherein adjusting thedepth of field parameter further comprises adjusting an f-stop settingof a camera associated with the video visitation device.
 3. The methodof claim 2, wherein adjusting the f-stop setting further comprisesadjusting a focal length of a lens coupled to the video visitationdevice.
 4. The method of claim 2, wherein adjusting the f-stop settingfurther comprises adjusting an aperture setting of the camera associatedwith the video visitation device.
 5. The method of claim 1, whereinadjusting the depth of field parameter further comprises processing thevideo received from the video visitation device in a video processingdevice to blur one or more objects at the second distance from the videovisitation device.
 6. The method of claim 1, wherein adjusting the depthof field parameter is remotely controllable by a third party.
 7. Themethod of claim 5, further comprising providing the video to a secondviewing device for security monitoring, the second viewing device beingassociated with a remote control device configured to allow a thirdparty monitor to remotely control the depth of field parameter.
 8. Atangible computer readable medium comprising computer executable codethat, when executed by a processing device, causes the processing deviceto perform operations comprising: receiving video from a videovisitation device in a secure environment; storing the video receivedfrom the video visitation device in a data storage device; adjusting adepth of field parameter for the video, such that an image of a firstobject at a first distance from the video visitation device is in focusand an image of a second object at a second distance from the videovisitation device is blurred; and providing the adjusted video to aviewing device located outside of the secure environment.
 9. Thecomputer readable medium of claim 8, wherein adjusting the depth offield parameter further comprises processing the video received from thevideo visitation device in a video processing device to blur one or moreobjects at the second distance from the video visitation device.
 10. Thecomputer readable medium of claim 8, wherein adjusting the depth offield parameter is remotely controllable by a third-party monitor. 11.The computer readable medium of claim 10, further comprising providingthe video to a second viewing device for security monitoring, the secondviewing device being associated with a remote control device configuredto allow the third-party monitor to remotely control the depth of fieldparameter.
 12. The computer readable medium of claim 11, furthercomprising providing the video stored in the data storage device to aninvestigator in response to indicia from the third-party monitor. 13.The computer readable medium of claim 8, further comprising providingthe video stored in the data storage device to an investigator inresponse to a request from the investigator.
 14. A system, comprising: adata communication device configured to receive video from a videovisitation device in a secure environment; a data storage device coupledto the data communication device and configured to store the videoreceived from the video visitation device; a data processor configuredto adjust a depth of field parameter for the video, such that an imageof a first object at a first distance from the video visitation deviceis in focus and an image of a second object at a second distance fromthe video visitation device is blurred; and wherein the datacommunication device is configured to provide the video to a viewingdevice located outside of the secure environment.
 15. The system ofclaim 14, further comprising a camera controller configured to adjust anf-stop setting of a camera associated with the video visitation device.16. The system of claim 15, wherein the camera controller iscontrollable by a third-party to remotely adjust the f-stop setting. 17.The system of claim 15, wherein the camera controller is furtherconfigured to adjust a focal length of a lens coupled to the videovisitation device.
 18. The system of claim 15, wherein the cameracontroller is further configured to adjust an aperture setting of thecamera associated with the video visitation device.
 19. The system ofclaim 14, further comprising a second viewing device for securitymonitoring, the second viewing device being associated with a remotecontrol device configured to allow a third-party to remotely control thedepth of field parameter.
 20. The system of claim 19, wherein the datacommunication device is further configured to provide the video storedin the data storage device to an investigator in response to indiciafrom the third-party.
 21. The system of claim 14, further configured toprovide the video stored in the data storage device to an investigatorin response to a request from the investigator.