Detecting unauthorized visitors

ABSTRACT

An unauthorized visitor system collects an image of a person detected in a room of a patient. The system identifies reference points on the person&#39;s face, for example, points along the cheeks, jowls, and/or brow. The system may compare the reference points to reference points of images associated with registered visitors. The system then determines, based on the comparison, if the person is a registered visitor. One or more designated recipients may be alerted if the person is not a registered visitor or if the person breaches a patient identification zone established around a particular patient. The system may also register the person in a database of visitors.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application Ser.No. 62/273,735, entitled “Methods and Systems for Detecting StrokeSymptoms,” filed Dec. 31, 2015, herein incorporated by reference in itsentirety, and is related to commonly assigned U.S. patent applicationsentitled “Methods and Systems for Assigning Locations to Devices”(Attorney Docket CRNI.254459), and “Methods and Systems for DetectingProhibited Objects in a Patient Room” (Attorney Docket CRNI.254469),filed concurrently herewith on the same date.

BACKGROUND

Medical facilities, such as hospitals, face many challenges in additionto simply caring for patients. For example, securing patients andequipment (e.g., medical devices) consumes many resources and currentmethods lack effectiveness. In addition to requiring personnel tophysically monitor locations within the facility, visitor logs andvisitor badges, and radio-frequency identification (RFID) technology areoften utilized to control access to certain locations within thefacility. However, each of these require subjective decision-making andare prone to error by the personnel monitoring the locations orassisting visitors signing a visitor log and issuing visitor badgesaccordingly. Further, none of these methods necessarily prevent anauthorized visitor from breaching areas of the facility where theauthorized visitor is not authorized. For example, a visitor may beauthorized to visit a particular patient but, based on some condition ofthe patient, may not have close contact with the patient. In contrast, acaregiver of the same patient may need to have close contact with thepatient. Additionally, in some situations, an authorized visitor mayunwittingly provide contraband (e.g., some thing or some object aparticular patient is not allowed) to a patient that the current methodsare unable to detect. Finally, medical devices are constantly beingshuffled between patients and locations within a facility. Tracking thelocations of these devices can be extremely difficult. Accordingly,overall security for patients and equipment suffers and the manyresources currently being utilized are wasted.

BRIEF SUMMARY

This brief summary is provided as a general overview of the moredetailed disclosure which follows. It is not intended to identify key oressential elements of the disclosure, or to define the claim terms inisolation from the remainder of the disclosure, including the drawings.

This disclosure generally relates to methods and systems for detectingunauthorized visitors in medical facilities. Generally, and withoutlimitation, the method involves collecting an image of a person detectedin a room of a patient. The system identifies reference points on theperson's face, for example, points along the cheeks, jowls, and/or brow.The system may compare the reference points to reference points ofimages associated with registered visitors. The system then determines,based on the comparison, if the person is a registered visitor. One ormore designated recipients may be alerted if the person is not aregistered visitor or if the person breaches a patient identificationzone established around a particular patient. The system may alsoregister the person in a database of visitors.

In some aspects, this disclosure relates to a method for detectingunauthorized visitors. The method comprises: receiving from a 3D motionsensor an image of a person detected in a room of a patient; comparing,positions of a plurality of reference points of the image to positionsof a plurality of registered reference points of images associated withregistered visitors, the plurality of registered reference points ofimages associated with registered visitors stored in a database ofregistered visitors; determining, based on the comparing, if the personis a registered visitor; and registering the person, if the determiningindicates the person is not a registered visitor.

In some aspects, this disclosure relates to a system for detectingunauthorized visitors. The system comprises: one or more 3D motionsensors located to provide the one or more 3D motion sensors with a viewof a person to be monitored, the 3D motion sensors configured to collecta series of images of the face of the person; a computerized monitoringsystem communicatively coupled to the one or more 3D motion sensors, thecomputerized monitoring system configured to identify a plurality ofreference points on the face of the person and to compare positions ofthe plurality of the reference points to positions of a plurality ofregistered reference points on the face of registered visitors todetermine if the person is a registered visitor, the plurality ofregistered reference points on the face of registered visitors stored ina database; and a computerized communication system communicativelycoupled to the computerized monitoring system, the computerizedcommunication system configured to send an alert to one or moredesignated recipients if the person is not a registered visitor and isdetermined to be an unauthorized visitor for the patient.

The unauthorized visitor system may further comprise a central videomonitoring system. The central video monitoring system may becommunicatively coupled to the computerized communication system. Thecentral video monitoring system may be configured to display an image ofthe person. The central video monitoring system may comprise a primarydisplay. The central video monitoring system may comprise an alertdisplay. The alert display may be a dedicated portion of the primarydisplay. The alert display may be a separate display or series ofdisplays from the primary display. If the computerized patientmonitoring system detects a person that is not a registered visitor, thecentral communication system may be configured to send an alert to thecentral video monitoring system. The central video monitoring system maybe configured to move the display of the image of the person from theprimary display to the alert display upon receipt of an alert.

In some aspects this disclosure relates to computer-readable storagemedia having embodied thereon computer-executable instructions. Whenexecuted by one or more computer processors the instructions may causethe processors to: receive from a 3D motion sensor an image of a persondetected in a room of a patient; compare, the image of the person toimages of registered visitors stored in a database of registeredvisitors; determine, based on the comparing, if the person is aregistered visitor; and alert one or more designated recipients if theperson is not a registered visitor and is determined to be anunauthorized visitor for the patient.

Additional objects, advantages, and novel features of the disclosurewill be set forth in part in the description which follows, and in partwill become apparent to those skilled in the art upon examination of thefollowing, or may be learned by practice of the disclosure.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING

The description references the attached drawing figures, wherein:

FIGS. 1-6 are exemplary flowcharts for unauthorized visitor detectionsystems, in accordance with embodiments of the present disclosure; and

FIGS. 7-20 are exemplary displays for unauthorized visitor detectionsystems, in accordance with embodiments of the present disclosure.

DETAILED DESCRIPTION

As noted in the Background, medical facilities, such as hospitals, facemany challenges in addition to simply caring for patients. For example,securing patients and equipment (e.g., medical devices) consumes manyresources and current methods lack effectiveness. In addition torequiring personnel to physically monitor locations within the facility,visitor logs and visitor badges, and radio-frequency identification(RFID) technology are often utilized to control access to certainlocations within the facility. However, each of these require subjectivedecision-making and are prone to error by the personnel monitoring thelocations or assisting visitors signing a visitor log and issuingvisitor badges accordingly. Further, none of these methods necessarilyprevent an authorized visitor from breaching areas of the facility wherethe authorized visitor is not authorized. For example, a visitor may beauthorized to visit a particular patient but is not authorized to visitanother patient or particular areas of the facility. Additionally, insome situations, an authorized visitor may unwittingly providecontraband (e.g., some thing or some object a particular patient is notallowed to possess or be near) to a patient that the current methods areunable to detect. Finally, medical devices are constantly being shuffledbetween patients and locations within a facility. Tracking the locationsof these devices can be extremely difficult. Accordingly, overallsecurity for patients and equipment suffers and the many resourcescurrently being utilized are wasted.

The subject matter of the present invention is described withspecificity herein to meet statutory requirements. However, thedescription itself is not intended to limit the scope of this patent.Rather, the inventor has contemplated that the claimed subject mattermight also be embodied in other ways, to include different steps orcombinations of steps similar to the ones described in this document, inconjunction with other present or future technologies. Moreover,although the terms “step” and/or “block” may be used herein to connotedifferent elements of methods employed, the terms should not beinterpreted as implying any particular order among or between varioussteps herein disclosed unless and except when the order of individualsteps is explicitly described.

As shown in FIG. 1, a system for detecting unauthorized visitors 100 mayinclude one or more 3D motion sensors 104. A 3D motion sensor is anelectronic device that contains one or more cameras capable ofidentifying individual objects, people and motion. The 3D motion sensormay further contain one or more microphones to detect audio. The camerascan utilize technologies including but not limited to color RGB, CMOSsensors, lasers, infrared projectors and RF-modulated light. The 3Dmotion sensor may have one or more integrated microprocessors and/orimage sensors to detect and process information both transmitted fromand received by the various cameras. Exemplary 3D motion sensors includethe Microsoft® Kinect® Camera, the Sony® PlayStation® Camera, and theIntel® RealSense™ Camera, each of which happens to include microphones,although sound capture is not essential to the practice of thedisclosure. A user may be able to configure alerts based on data that isreceived from the 3D motion sensor 104 and interpreted by thecomputerized patient monitoring system 106. For example, a user canconfigure the computerized patient monitoring system 106 to providealerts based on data the computerized patient monitoring system 106 hasinterpreted for setting zones in a patient's room, comparing data frommultiple systems (RTLS or facial recognition) to determine authorizedvisitors, a patient crossing a trip wire, falling on the ground, orentering or exiting a safety zone.

As used herein, “a sensor” and “sensors” are used interchangeably in thesingular and plural unless expressly described as a singular sensor oran array of sensors. A singular sensor may be used, or a sensor maycomprise two or more cameras integrated into a single physical unit.Alternately, two or more physically distinct sensors may be used, or twoor more physically distinct arrays of sensors may be used.

An “unauthorized visitor” may be a person in the room of a patient beingmonitored that is already registered in a database of persons (e.g.,caregiver, staff, or visitor), but not allowed to be in close proximityto the patient. An unauthorized visitor may be a person in the room ofthe patient being monitored that has not yet been registered in adatabase of persons.

A 3D motion sensor 104 may be co-located with a patient 102 to bemonitored. The patient 102 to be monitored may be monitored in a varietyof environments, including, without limitation, a hospital, a home, ahospice care facility, a nursing home, an assisted living facility, anoutpatient medical care facility, and the like. The 3D motion sensor 104may be positioned where it is likely to capture skeletal tracking of thepatient 102 to be monitored or visitors entering the room. For example,a 3D motion sensor 104 may be oriented to take images of a bed, chair,or other location where the patient 102 to be monitored or visitorsentering the room may spend a significant amount of time. The 3D motionsensor 104 may be permanently installed, or may be temporarily set up ina room as needed. The patient 102 to be monitored may be under immediatemedical care, e.g., in a medical facility under the supervision of amedical professional, or may not be under immediate care, e.g., in ahome or other environment, possibly with a caregiver. A caregiver may bea medical professional or paraprofessional, such as an orderly, nurse'saide, nurse, or the like. A caregiver may also be a friend, relative,individual, company, or facility that provides assistance with dailyliving activities and/or medical care for individuals, such asindividuals who are disabled, ill, injured, elderly, or otherwise inneed of temporary or long-term assistance. In some instances, the personto be monitored may be self-sufficient and not under the immediate careof any other person or service provider.

The 3D motion sensor 104 may communicate data, such as skeletal imagesof the patient 102 being monitored or a visitor detected in the room, toa computerized patient monitoring system 106. The computerized patientmonitoring system 106 is a computer programmed to monitor transmissionsof data from the 3D motion sensor 104. The computerized patientmonitoring system 106 may be integral to the 3D motion sensor 104 or adistinctly separate apparatus from the 3D motion sensor 104, possibly ina remote location from 3D motion sensor 104 provided that thecomputerized patient monitoring system 106 can receive data from the 3Dmotion sensor 104. The computerized patient monitoring system 106 may belocated in the monitored person's room, such as a hospital room,bedroom, or living room. The computerized patient monitoring system 106may be connected to a central video monitoring system 116. Thecomputerized patient monitoring system 106 and central video monitoringsystem 116 may be remotely located at any physical locations so long asa data connection exists (USB, TCP/IP or comparable) between thecomputerized patient monitoring system 106, the central communicationsystem 112 (if separate from computerized patient monitoring system106), the central video monitoring system 116, and the 3D motionsensor(s) 104.

The computerized patient monitoring system 106 may receive data from 3Dmotion sensor 104 for a monitoring zone (i.e., the patient's room orarea to be monitored). At step 108, the computerized patient monitoringsystem 106 may assess whether a visitor is detected in the room usingskeletal tracking based on detecting a skeleton in addition to theskeleton of the patient. If a visitor is not detected in the room, thecomputerized patient monitoring system 106 may continue to analyzeimages in the monitoring zone as long as 3D motion sensor 104 continuesto transmit data.

If a visitor is detected within the monitoring zone at step 108 (viaskeletal tracking indicating that two skeletons are too close to eachother), computerized patient monitoring system 106 may, at step 110,determine whether the visitor was in proximity to the patient.Computerized patient monitoring system 106 may establish a patientidentification zone within the monitoring zone that, if crossed by avisitor establishes that the visitor was in proximity to the patient.Such a patient identification zone may also be configured by anadministrator of the computerized patient monitoring system 106. Patientidentification zones can be established using any shapes, including,without limitation, rectangles, squares, circles, ovals, triangles, andirregular shapes.

Computerized patient monitoring system 106 may assign reference pointsto identify the boundaries of the patient identification zone. Forexample, reference points may be assigned to a perimeter around thepatient. It should be understood that the selection of the referencepoints may vary with the individual and/or the configuration of themonitoring system 100. Reference points may be configured automaticallyby the monitoring system 100, may be configured automatically by themonitoring system 100 subject to confirmation and/or modification by asystem user, or may be configured manually by a system user.

On detecting the visitor came into close proximity to the patient, suchas by entering the patient identification zone, and is now considered anunauthorized visitor, central communication system 112 may be configuredto send an alert of the unauthorized visitor to one or more designatedrecipients (e.g., caregiver(s) 120). Central communication system 112may be an integral part of computerized patient monitoring system 106and/or may be implemented using separate software, firmware and/orhardware, possibly physically remote from central communication system112.

When an alert is triggered, the alert may be sent, at least initially,to the patient 102 being monitored, to give the patient 102 beingmonitored an opportunity to respond before alerting the central videomonitoring system 116 and/or caregiver(s) 120. For example, an audiblemessage may be played in the room where patient 102 is being monitored,possibly asking something like, “Please refrain from close contact withthe patient.”

Shown as step 114 in FIG. 1, computerized patient monitoring system 106can analyze subsequent image data from 3D motion sensor 104 forcorrective action such as the unauthorized visitor moving out of thepatient identification zone or gestures, such as a head nod, consistentwith a yes or no answer to determine if the action will be corrected. If3D motion sensor 104 is equipped with microphones, computerized patientmonitoring system 106 can analyze sound data for recognizable words,such as okay, yes, or no, help.

Central video monitoring system 116 may be alerted if no response isreceived at step 114, or if the response is unintelligible or indicatesthat the patient 102 being monitored and/or the unauthorized visitordoes not intent to comply with the patient identification zonerequirements. Alternately, or additionally, central video monitoringsystem 116 may be alerted with or even before patient 102, so thatcentral video monitoring system 116 can determine whether theunauthorized visitor detected is, in fact, problematic. On receiving analert, the central video monitoring system 116, or an attendant there,may view live image, video and/or audio feed from the 3D motion sensor104, and evaluate whether the unauthorized visitor presents a danger tothe patient and/or himself. If patient 102 has been alerted by thecentral communication system 112, central video monitoring system 116 oran attendant there can use the data from 3D motion sensor 104 toevaluate whether a response from patient 102 is indicates that patient102 or unauthorized visitor is complying with the patient identificationzone requirements. Central video monitoring system 116 and/orcomputerized patient monitoring system 106 may analyze the response frompatient 102 and/or unauthorized visitor, however, if the response doesnot include words or gestures recognizable by the computerized system,an attendant at central video monitoring system 116 may be able tointerpret the person's response. If needed, the central video monitoringsystem 116 and/or the attendant could then approve alert(s) toappropriate caregiver(s) 120 and/or call for emergency assistance (e.g.,send a request for security).

One or more caregiver(s) 120 local to patient 102 can be alerted with oreven before patient 102 and/or central video monitoring system 116, sothat the caregiver(s) 120 can assess what is happening in person. Or,monitored patient 102, caregiver(s) 120 and the central video monitoringsystem 1116 could all be alerted at the same time. The priority andtiming of alerts to different individuals or stations can be configuredin accordance with the needs and desires of a particular facility,experience with a particular monitored individual or type of patient, orany other criterion of the system owner or user. This is true forinitial alerts as well as continuing alerts (e.g., if an unauthorizedvisitor is detected in and remains in close proximity to the patient102, and no response from patient 102 or a caregiver 120 is received orobserved) or repeated alerts (two or more distinct events where anunauthorized visitor is detected in close proximity to the patient 102).The priority and timing of alerts to different individuals may bedifferent for initial, continuing, and/or repeated alerts.

Data associated with alerts may be logged by computerized patientmonitoring system 106 and/or central video monitoring system 116 in adatabase 118. Data associated with an alert may include, withoutlimitation, the telemetry data from 3D motion sensor 104 that triggeredthe alert; buffered data preceding the telemetry data that triggered thealert; telemetry data subsequent to the alert; the number andsubstantive content of an alert; the individual(s) and/or groups to whoman alert was addressed; the response, if any, received or observedfollowing an alert; and combinations thereof.

As shown in FIG. 2, unauthorized visitor system 200 may be utilized toregister a person(s) 202 entering the room of a patient. For example, 3Dmotion sensor 204 may detect a person 202 entering the room of thepatient. Facial features of the visitor may be analyzed by computerizedpatient monitoring and facial recognition system 206 to determine if thevisitor has a recognition profile stored in database 210. If the personis registered (i.e., indicating a recognition profile of the person hasbeen stored in database 210), no further action is taken. If the personis not registered in database 210, a recognition profile is created forthe person in database 210. The recognition profile may include image ofthe person, identifying information indicating whether the person is acaregiver, staff, or visitor, and any rights and/or privileges thatperson may have.

In FIG. 3, a 3D motion sensor 304 may be co-located with a patient 302to be monitored. The patient 302 to be monitored may be monitored in avariety of environments, including, without limitation, a hospital, ahome, a hospice care facility, a nursing home, an assisted livingfacility, an outpatient medical care facility, and the like. The 3Dmotion sensor 304 may be positioned where it is likely to capture imagesof the face of the patient 302 to be monitored. For example, a 3D motionsensor 304 may be oriented to take images of a bed, chair, or otherlocation where the patient 302 to be monitored may spend a significantamount of time. In some embodiments, the 3D motion sensor 304 may beoriented to take images of persons entering and exiting the room of thepatient 302 to be monitored. In some embodiments, the 3D mention sensor304 may be oriented to take images of items or equipment (e.g., medicaldevices) that may be located in the room of the patient 302 to bemonitored. The 3D motion sensor 304 may be permanently installed, or maybe temporarily set up in a room as needed. The patient 302 to bemonitored may be under immediate medical care, e.g., in a medicalfacility under the supervision of a medical professional, or may not beunder immediate care, e.g., in a home or other environment, possiblywith a caregiver. A caregiver may be a medical professional orparaprofessional, such as an orderly, nurse's aide, nurse, or the like.A caregiver may also be a friend, relative, individual, company, orfacility that provides assistance with daily living activities and/ormedical care for individuals, such as individuals who are disabled, ill,injured, elderly, or otherwise in need of temporary or long-termassistance. In some instances, the person to be monitored may beself-sufficient and not under the immediate care of any other person orservice provider.

The 3D motion sensor 304 may communicate data, such as images of thepatient 302 being monitored or a visitor detected in the room, to acomputerized patient monitoring system 306. The computerized patientmonitoring system 306 is a computer programmed to monitor transmissionsof data from the 3D motion sensor 304. The computerized patientmonitoring system 306 may be integral to the 3D motion sensor 304 or adistinctly separate apparatus from the 3D motion sensor 304, possibly ina remote location from 3D motion sensor 304 provided that thecomputerized patient monitoring system 306 can receive data from the 3Dmotion sensor 304. The computerized patient monitoring system 306 may belocated in the monitored person's room, such as a hospital room,bedroom, or living room. The computerized patient monitoring system 306may be connected to a central video monitoring system 316. Thecomputerized patient monitoring system 306 and central video monitoringsystem 316 may be remotely located at any physical locations so long asa data connection exists (USB, TCP/IP or comparable) between thecomputerized patient monitoring system 306, the central communicationsystem 312 (if separate from computerized patient monitoring system306), the central video monitoring system 316, and the 3D motionsensor(s) 304.

The computerized patient monitoring system 306 may receive data from 3Dmotion sensor 304 for a monitoring zone (i.e., the patient's room orarea to be monitored). At step 308, the computerized patient monitoringsystem 306 may assess whether a visitor is detected in the room. If avisitor is not detected in the room, the computerized patient monitoringsystem 306 may continue to analyze images in the monitoring zone as longas 3D motion sensor 304 continues to transmit data.

If a visitor is detected (via skeletal tracking or blob recognition)within the monitoring zone at step 308, computerized patient monitoringsystem 306 may, at step 310, determine whether the visitor in anauthorized visitor (via facial recognition). To do so, computerizedpatient monitoring system 306 may assign reference points to distinctivefeatures of the image of the visitor. For example, reference points maybe assigned around the eyes and reference points around the mouth of thevisitor. It should be understood that the selection of the referencepoints may vary with the individual and/or the configuration of themonitoring system 300. For example, if bandages or physiologicalanomalies would complicate the tracking of routine reference points,alternative reference points may be assigned. Reference points may beconfigured automatically by the monitoring system 300, may be configuredautomatically by the monitoring system 300 subject to confirmationand/or modification by a system user, or may be configured manually by asystem user. The reference points corresponding to the visitor may becompared to a database comprising reference points of known orauthorized visitors. Various machine learning and/or facial recognitiontechniques may additionally be utilized to determine if the visitor isan authorized visitor. If no match is found in the database of knownvisitors, the visitor may be an unauthorized visitor.

Accordingly, computerized patient monitoring system 306 may communicatean image of the visitor to central communication system 312. Centralcommunication system 312 may be configured to send an alert of theunauthorized visitor to one or more designated recipients (e.g.,caregiver(s) 320). Central communication system 312 may be an integralpart of computerized patient monitoring system 306 and/or may beimplemented using separate software, firmware and/or hardware, possiblyphysically remote from central communication system 312. When an alertis triggered, the alert may be sent, at least initially, to the patient302 being monitored, to give the patient 302 being monitored anopportunity to respond before alerting the central video monitoringsystem 316 and/or caregiver(s) 320. For example, an audible message maybe played in the room where patient 302 is being monitored, possiblyasking something the visitor to, “Please show your identification.”

Shown as step 314 in FIG. 1, computerized patient monitoring system 306can analyze subsequent image data from 3D motion sensor 304 forcorrective action such as the unauthorized visitor adequately providingidentification, such as by showing identifying or providing anindication consistent with a yes or no answer to determine if the actionwill be corrected. If 3D motion sensor 304 is equipped with microphones,computerized patient monitoring system 306 can analyze sound data forrecognizable words, such as okay, yes, or no, help.

Central video monitoring system 316 may be alerted if no response isreceived at step 314, or if the response is unintelligible or indicatesthat the unauthorized visitor does not intent to comply. Alternately, oradditionally, central video monitoring system 316 may be alerted with oreven before patient 302, so that central video monitoring system 316 candetermine whether the unauthorized visitor detected is, in fact,problematic. On receiving an alert, the central video monitoring system316, or an attendant there, may view live image, video and/or audio feedfrom the 3D motion sensor 304, and evaluate whether the unauthorizedvisitor presents a danger to the patient and/or himself. If patient 302has been alerted by the central communication system 312, central videomonitoring system 316 or an attendant there can use the data from 3Dmotion sensor 304 to evaluate whether a response from patient 302 isindicates that unauthorized visitor is complying with identificationrequirements. Central video monitoring system 316 and/or computerizedpatient monitoring system 306 may analyze the response from patient 302and/or unauthorized visitor, however, if the response does not includewords or gestures recognizable by the computerized system, an attendantat central video monitoring system 316 may be able to interpret theperson's response. If needed, the central video monitoring system 316and/or the attendant could then approve alert(s) to appropriatecaregiver(s) 320 and/or call for emergency assistance (e.g., send arequest for security).

One or more caregiver(s) 320 local to patient 302 can be alerted with oreven before patient 302 and/or central video monitoring system 316, sothat the caregiver(s) 320 can assess what is happening in person. Or,monitored patient 302, caregiver(s) 320 and the central video monitoringsystem 1316 could all be alerted at the same time. The priority andtiming of alerts to different individuals or stations can be configuredin accordance with the needs and desires of a particular facility,experience with a particular monitored individual or type of patient, orany other criterion of the system owner or user. This is true forinitial alerts as well as continuing alerts (e.g., if an unauthorizedvisitor is detected, and no response is received or observed) orrepeated alerts (two or more distinct events where an unauthorizedvisitor is detected). The priority and timing of alerts to differentindividuals may be different for initial, continuing, and/or repeatedalerts.

Data associated with alerts may be logged by computerized patientmonitoring system 306 and/or central video monitoring system 316 in adatabase 318. Data associated with an alert may include, withoutlimitation, the telemetry data from 3D motion sensor 304 that triggeredthe alert; buffered data preceding the telemetry data that triggered thealert; telemetry data subsequent to the alert; the number andsubstantive content of an alert; the individual(s) and/or groups to whoman alert was addressed; the response, if any, received or observedfollowing an alert; and combinations thereof. In embodiments, data forauthorized visitors (e.g., recognition profile) may also be stored indatabase 318.

As shown in FIG. 4, unauthorized visitor system 400 may be utilized inconnection with a real-time locating system (RTLS) to register aperson(s) entering the room of a patient. For example, RTLS may detect asignal from an electronic transmitter (e.g., RFID, Bluetooth Low Energy,WiFi, ultrasound, infrared, Light Fidelity, and the like) worn by theperson detected, as shown at 402, indicating a person has entered theroom of the patient. Computerized patient monitoring and facialrecognition system, as shown at 404, receives the signal from the badge.If the person is a new caregiver or visitor, as shown at step 406, theperson is registered in database 408. If the person is not a newcaregiver or visitor, as shown at step 406, the person is not registeredin the database 408.

In FIG. 5, a 3D motion sensor 504 may be co-located with a patient 502to be monitored. The patient 502 to be monitored may be monitored in avariety of environments, including, without limitation, a hospital, ahome, a hospice care facility, a nursing home, an assisted livingfacility, an outpatient medical care facility, and the like. The 3Dmotion sensor 504 may be positioned where it is likely to capture imagesof the face of the patient 502 to be monitored. For example, a 3D motionsensor 504 may be oriented to take images of a bed, chair, or otherlocation where the patient 502 to be monitored may spend a significantamount of time. In some embodiments, the 3D motion sensor 504 may beoriented to take images of persons entering and exiting the room of thepatient 502 to be monitored. In some embodiments, the 3D mention sensor504 may be oriented to take images of items or equipment (e.g., medicaldevices) that may be located in the room of the patient 502 to bemonitored. The 3D motion sensor 504 may be permanently installed, or maybe temporarily set up in a room as needed. The patient 502 to bemonitored may be under immediate medical care, e.g., in a medicalfacility under the supervision of a medical professional, or may not beunder immediate care, e.g., in a home or other environment, possiblywith a caregiver. A caregiver may be a medical professional orparaprofessional, such as an orderly, nurse's aide, nurse, or the like.A caregiver may also be a friend, relative, individual, company, orfacility that provides assistance with daily living activities and/ormedical care for individuals, such as individuals who are disabled, ill,injured, elderly, or otherwise in need of temporary or long-termassistance. In some instances, the person to be monitored may beself-sufficient and not under the immediate care of any other person orservice provider.

The 3D motion sensor 504 may communicate data, such as images of thepatient 502 being monitored or a visitor detected in the room, to acomputerized patient monitoring system 506. The computerized patientmonitoring system 506 is a computer programmed to monitor transmissionsof data from the 3D motion sensor 504. The computerized patientmonitoring system 506 may be integral to the 3D motion sensor 504 or adistinctly separate apparatus from the 3D motion sensor 504, possibly ina remote location from 3D motion sensor 504 provided that thecomputerized patient monitoring system 506 can receive data from the 3Dmotion sensor 504. The computerized patient monitoring system 506 may belocated in the monitored person's room, such as a hospital room,bedroom, or living room. The computerized patient monitoring system 506may be connected to a central video monitoring system 516. Thecomputerized patient monitoring system 506 and central video monitoringsystem 516 may be remotely located at any physical locations so long asa data connection exists (USB, TCP/IP or comparable) between thecomputerized patient monitoring system 506, the central communicationsystem 512 (if separate from computerized patient monitoring system506), the central video monitoring system 516, and the 3D motionsensor(s) 504.

The computerized patient monitoring system 506 may receive data from 3Dmotion sensor 504 for a monitoring zone (i.e., the patient's room orarea to be monitored). At step 508, the computerized patient monitoringsystem 506 may assess whether a visitor is detected in the room (viaskeletal tracking or blob recognition). If a visitor is not detected inthe room, the computerized patient monitoring system 506 may continue toanalyze images in the monitoring zone as long as 3D motion sensor 504continues to transmit data.

If a visitor is detected within the monitoring zone at step 508,computerized patient monitoring system 506 may, at step 510, determinewhether the visitor in an authorized visitor. To do so, RTLS maydetermine whether a signal was detected, such as from a badge of thevisitor, as shown at 509, indicating an authorized person has enteredthe room of the patient. If a signal is detected, the computerizedpatient monitoring system 506 continues monitoring. If no signal isdetected, computerized patient monitoring system 506 may communicate animage of the visitor to central communication system 512. Centralcommunication system 512 may be configured to send an alert of theunauthorized visitor to one or more designated recipients (e.g.,caregiver(s) 520). Central communication system 512 may be an integralpart of computerized patient monitoring system 506 and/or may beimplemented using separate software, firmware and/or hardware, possiblyphysically remote from central communication system 512. When an alertis triggered, the alert may be sent, at least initially, to the patient502 being monitored, to give the patient 502 being monitored anopportunity to respond before alerting the central video monitoringsystem 516 and/or caregiver(s) 520. For example, an audible message maybe played in the room where patient 502 is being monitored, possiblyasking something the visitor to, “Please show your identification.”

Shown as step 514 in FIG. 1, computerized patient monitoring system 506can analyze subsequent image data from 3D motion sensor 504 forcorrective action such as the unauthorized visitor adequately providingidentification, such as by showing identifying or providing anindication consistent with a yes or no answer to determine if the actionwill be corrected. If 3D motion sensor 504 is equipped with microphones,computerized patient monitoring system 506 can analyze sound data forrecognizable words, such as okay, yes, or no, help.

Central video monitoring system 516 may be alerted if no response isreceived at step 514, or if the response is unintelligible or indicatesthat the unauthorized visitor does not intent to comply. Alternately, oradditionally, central video monitoring system 516 may be alerted with oreven before patient 502, so that central video monitoring system 516 candetermine whether the unauthorized visitor detected is, in fact,problematic. On receiving an alert, the central video monitoring system516, or an attendant there, may view live image, video and/or audio feedfrom the 3D motion sensor 504, and evaluate whether the unauthorizedvisitor presents a danger to the patient and/or himself. If patient 502has been alerted by the central communication system 512, central videomonitoring system 516 or an attendant there can use the data from 3Dmotion sensor 504 to evaluate whether a response from patient 502 isindicates that unauthorized visitor is complying with identificationrequirements. Central video monitoring system 516 and/or computerizedpatient monitoring system 506 may analyze the response from patient 502and/or unauthorized visitor, however, if the response does not includewords or gestures recognizable by the computerized system, an attendantat central video monitoring system 516 may be able to interpret theperson's response. If needed, the central video monitoring system 516and/or the attendant could then approve alert(s) to appropriatecaregiver(s) 520 and/or call for emergency assistance (e.g., send arequest for security).

One or more caregiver(s) 520 local to patient 502 can be alerted with oreven before patient 502 and/or central video monitoring system 516, sothat the caregiver(s) 520 can assess what is happening in person. Or,monitored patient 502, caregiver(s) 520 and the central video monitoringsystem 1516 could all be alerted at the same time. The priority andtiming of alerts to different individuals or stations can be configuredin accordance with the needs and desires of a particular facility,experience with a particular monitored individual or type of patient, orany other criterion of the system owner or user. This is true forinitial alerts as well as continuing alerts (e.g., if an unauthorizedvisitor is detected, and no response is received or observed) orrepeated alerts (two or more distinct events where an unauthorizedvisitor is detected). The priority and timing of alerts to differentindividuals may be different for initial, continuing, and/or repeatedalerts.

Data associated with alerts may be logged by computerized patientmonitoring system 506 and/or central video monitoring system 516 in adatabase 518. Data associated with an alert may include, withoutlimitation, the telemetry data from 3D motion sensor 504 that triggeredthe alert; buffered data preceding the telemetry data that triggered thealert; telemetry data subsequent to the alert; the number andsubstantive content of an alert; the individual(s) and/or groups to whoman alert was addressed; the response, if any, received or observedfollowing an alert; and combinations thereof. In embodiments, thedatabase 518 also stores information regarding authorized visitors andinformation (e.g., RFID transmitter identification).

As shown in FIG. 6, centralized monitoring system 606 may receive datafrom multiple computerized monitoring and communication systems 604A,604B, 604C. For simplicity, the computerized communication systemassociated with each computerized monitoring system is shown as anintegrated component of the computerized monitoring system. If desired,separate computerized communication systems and/or a shared computerizedcommunication system could be used. Computerized monitoring andcommunication systems 604 receive data from 3D motions sensors 602A,602B, 602C, which are, respectively, monitoring persons 601A, 601B,601C. Data received by the centralized monitoring system 606 fromcomputerized monitoring and communication systems 604A, 604B, 604C mayroutinely be displayed on centralized monitoring primary display 608. Asingle primary display 608 may display data from more than computerizedmonitoring and communication systems 604A, 604B, 604C, shown as view 700in FIG. 7. Alternately, primary display 608 may comprise two or moredistinct screens, each of which may display data from one or morecomputerized monitoring systems. As shown, the display for monitoredperson 701C has an open configuration window 710, which is described ingreater detail below.

When the centralized monitoring system 606 receives an alert from any ofthe computerized monitoring and communication systems 604A, 604B, 604C,indicating that a monitored person 601A, 601B, 601C in in proximity toan unauthorized visitor, audio and/or alert information for thatparticular person and/or the unauthorized visitor may be displayed onthe centralized monitoring alert display 612. An alert can be presentedin a variety of formats. An alert may be a visual cue on screen at thecentralized monitoring system 606, such as the specific camera viewflashing or being highlighted in a color to draw attention to thatdisplay among others. An alert may be an audible sound (e.g., a voice oralarm type sound) at the centralized monitoring system 606, an audiblesound at the computerized monitoring and communication system attachedto the 3D motion sensor, a text message, an email, turning on a light oreven running a program on a computer. Should the central monitoringstation 150 receive alerts from more than one of the computerizedmonitoring and communication systems 604A, 604B, 604C, indicating that aperson 601A, 601B, 601C in in proximity to an unauthorized visitor, thecentralized monitoring alert display 612 may display the video, audioand/or alerting information from all such instances at the same time. Ifno alert is received by the centralized monitoring station 606, it maybe that nothing is displayed on the centralized monitoring alert display612. Preferably, all monitored individual rooms can be displayed andvisible on the centralized monitoring primary display 608 whetheralerting or not. When an alert is generated, attention can be drawn tothe particular camera on centralized monitoring primary display 608and/or a duplicative display of the alerting camera can be displayed ona second separate computer monitor, e.g., the centralized monitoringalert display 612.

An electronic record of any alerts received, any responses to the alertobserved or received, and/or any actions taken by the centralizedmonitoring system 606 can be stored in a database 614.

FIG. 7 shows an exemplary view for central monitoring primary display700, including video data for multiple monitored persons 701A, 701B, and701C displayed on a single screen. FIG. 8 shows an alternative view forcentral monitoring primary display 800, including image data for onlymonitored patient 801C. The view includes a skeletal FIG. 810, which maybe identified by central video monitoring system, and used to track or“lock on to” the patient 801C. A skeletal FIG. 810 is shown in FIG. 8,however, alternate image analysis could be used, including, withoutlimitation, blob recognition. No patient identification zones are markedin the image of FIG. 8. FIG. 9 shows an exemplary configuration menu900, with an option 910 for configuring a face monitoring zone, anoption 920 for configuring other saved zones, and an option 930 to clearall configured zones.

FIG. 10 shows view 1000 as it might appear on selecting a menu option toconfigure one or more zones. FIG. 10 shows a patient identification zone1000 generally about the upper torso, shoulders, and head of a patientlying in a hospital bed. Patient identification zone 1000 may beconfigured by the computerized patient monitoring system. For example,patient identification zone 1000 may be defined as a fixed perimeter orvolume around the head of a patient, as determined based on analysisusing skeleton figure, blob recognition, and/or facial tracking. Ifconfigured by the computerized patient monitoring system 106, a user maybe allowed to modify the system-configured patient identification zone1000, or a user may be required or allowed to manually configure thepatient identification zone 1000. The 3D motion sensor 104 may collectimage and/or sound data for a broader portion of a room than just thepatient identification zone 1000. The computerized patient monitoringsystem 106 may analyze only data related to the patient identificationzone 1000, with or without capturing images and/or sound from a broaderportion of the room. This may reduce total processing capacity required,as the most processing-intensive algorithms (e.g., facial tracking,identification and tracking of reference points) are run on a limiteddata set. Capturing broader image data may help provide context for analert, e.g., at central video monitoring system. For example, usingimage data from most or all of the room, central video monitoring systemor an attendant there may determine that it is unnecessary to send analert to a caregiver if there is already a caregiver in the room andtending to the patient being monitored at the time of an alert. Apatient identification zone 1000 may also help monitoring system “lockon” to a person, and help avoid situations where a patient who is veryclose to the person being monitored might be tracked after moving awayfrom the person. If the patient moves out of patient identification zone1000, but the person being monitored does not leave patientidentification zone 1000, monitoring system will continue to monitorperson in patient identification zone 1000.

Using facial recognition algorithms, the computerized patient monitoringsystem may identify key features of the face of patient being monitored.Key features may include, without limitation, the orbit of the eyesocket(s), eyebrow(s), eyebrow ridge(s), the nose, the bridge of thenose, the mouth, top of the head, hairline, chin, ears, cheekbones, etc.The features used may vary with the kind of technology (e.g., visiblevs. infrared light) and/or prominent or accessible features on patient.

The computerized patient monitoring system may use facial trackingrather than facial recognition, facial recognition implying that thesoftware attempts to identify a particular person (e.g., Jane Doe) basedon facial features, as opposed to recognizing a particular facialfeature (e.g., an eye) using facial tracking. If desired, facialrecognition algorithms could also be used, e.g., to confirm that thesystem has “locked on” to the intended person being monitored; or toconfirm the identity of the person.

The computerized patient monitoring system may identify soft-tissuereference points on the face of monitored person. Exemplary soft-tissuereference points may generally outline the eyes and/or the mouth. Otherexemplary soft-tissue reference points, which could be used with or inlieu of the eyes and/or mouth, include the jowls, flesh along thecheekbone, the neck, and the portion of the neck immediately under thechin. The eyes and/or mouth may be preferred as they are easilyidentified by facial tracking algorithms and tend to be readily visibleeven if the person being monitored is wearing a blanket or high-neckedclothing.

If patient identification zone 1000 is configured by a user, the usermay operate an input device to select a point on an image or video fromthe computerized patient monitoring station. The user may draw aperimeter defining a zone freehand, or may drag the input device (suchas an electronic stylus or mouse pointer) from one point to another todefine a diagonal axis for the perimeter of the zone. Otherconfiguration options, including drag-and-drop templates and coordinateidentification, could be used. A 2D monitoring zone can be operated as aperimeter, or a third dimension of depth can be specified. As with theperimeter, the computerized patient monitoring system can define orrecommend a depth measurement, such as shown by label 1100 in FIG. 11,or the user can provide the depth measurement, as described below.

FIG. 12 shows a pop-up menu 1200 allowing a user to configure orreconfigure the depth of a patient identification zone. The exemplarypop-up menu 1200 solicits a depth parameter specified in millimeters(mm), however, any desired unit of measure could be used, including,without limitation, centimeters (cm), meters (m), inches, feet, andyards.

On setting a depth parameter, and while still in a configuration view,the depth of the patient identification zone may be visible as a label1300, as shown in FIG. 13. The depth label 1300 may not be visibleduring routine monitoring and/or alert monitoring, so as not to obscurethe person being monitored and/or other activity in any image data from3D motion sensor.

FIG. 14 shows another menu 1400 from configuration view. As shown inFIG. 14, a user may be permitted to turn monitoring on or off (e.g., by“unchecking” both video feed and audio feed), or to turn off video feedonly, or to turn off audio feed only, if audio feed is available. It maybe desirable to disable audio feed, for example, at central videomonitoring system, to prevent overlapping audio feeds from becomingunintelligible noise. If voice or word recognition algorithms are used,those algorithms may run at computerized patient monitoring system evenif audio feed is disabled at a monitoring station, such as central videomonitoring system. On alert or as desired, the audio feed could beenabled for one or more particular persons being monitored, e.g., toprovide context for an alert. It may be desirable to disable audioand/or video feed to provide some privacy to the patient correspondingto the person being monitored. For example, it may be desirable todisable audio and/or video feed while the patient is being examined by amedical professional, or bathed, or while visitors are present. The needfor computerized monitoring is somewhat reduced while the patient isinteracting with medical professionals, caregivers, or visitors.However, if desired, the audio and/or video feed can be maintained evenwhen there are other others with the patient corresponding to the personbeing monitored.

Although patient identification zone may be configured and operational,they may not be shown outside of the configuration screens for thosezone, as in FIG. 14. That is, the zone may be configured andoperational, but not superimposed on the images of patient, so as topermit an unobstructed view of patient, e.g., at central videomonitoring system or while configuring other aspects of the monitoringsystem.

If the Device menu 1400 in FIG. 14 is selected, the user may see apop-up menu 1500, as shown in FIG. 15. The use of pop-up, drop down,tabular, or other kinds of menus may be recommended based on, forexample, the number and kinds of options associated with a particularmenu. However, different kinds of menus could be presented based on useror facility preferences. Pop-up menu 1500 includes a number of tabs,from which a tab for Alerts 1510 has been selected in FIG. 15. The spacewithin the Alerts window 1520 is blank, indicating that no alerts havebeen configured. If a user selects Add button 1530 at the bottom of theAlerts tab 1510, a new pop-up menu 1600 may appear, as shown in FIG. 12.

As shown in FIG. 16, pop-up menu 1620 further includes drop-down menusto configure an alert by specifying an event 1622, an action 1624, and,if applicable, an N/A field 1626. As with the kinds of menus, theparticular words used to describe an event, action, and/or NA field maybe modified to reflect the environment in which the system is beingused, or the facility or personnel using the system or a particularstation. For example, a system, station, or user interface may beconfigured for use in a hospital using clinical terminology. As anotherexample, a remote central video monitoring system may have an attendantwho is not a medical professional, and lay terminology might be used inlieu of or in addition to clinical terminology. Family or othernon-professional and/or non-medical caregivers may have access to themonitoring system and/or serve as an attendant for a remote monitoringstation, and the menus for those users may similarly use descriptive,non-clinical terminology in addition to or in lieu of clinicalterminology. Different languages could also be used for differentinterfaces. As shown in FIG. 16, the monitoring system may includemonitoring and/or alert functions unrelated to unauthorized visitors, aswell as the “Visitor Present” option presented. If desired, otheroptions may be removed from the drop-down menu to simplify userconfiguration choices for users who do not want or need access to theother functions. Changes to the menus, including changes to the range ofmenu options and the terminology used in the menus, may be configuredwhen the system is installed or when access is provided to a specificuser, and may not require or may not be available for furthermodification by routine system users.

On selection of an event 1622 in FIG. 16, the user may be able to selectan action 1624, as shown in FIG. 17. Several of the options relate toalerts, e.g., to provide different audible signals to the 3D motionsensor and/or computerized patient monitoring system; to add or change acolor border to a display of image data; to highlight or flash a displayof image data; to log an alert, as in database; to send e-mail or SMS;or to provide other alerts. As shown in FIG. 17, the user has elected tohighlight/flash 1712 a display of image data if event 1710 occurs, e.g.,if a visitor is present.

As shown in FIG. 18, N/A field 1830 may be blank and/or inactivedepending upon the event 1810 and action 1820 selected. In the exampleshown in FIG. 17, the option to highlight/flash an image display doesnot require further configuration, and so N/A field 1830 is blank andinactive, in that the user cannot input options for N/A field 1830.However, if the action was set to send an alert, for example, N/A field1830 might become active and allow a user to designate a recipientand/or recipient group to whom the alert should be sent. If the userdesires to send different kinds of alerts to different recipients orgroups of recipients, multiple alerts could be configured, with eachalert specifying a different action 1820 (e.g., send e-mail vs. sendSMS) and/or a different recipient. As another example, the N/A field1830 could be used to specify where to log the occurrence of an event,for example, if more than one database is available to the monitoringsystem, or if data for more than one monitored person is stored in theavailable database(s).

As shown in FIG. 19, after an alert has been configured, theconfiguration view may revert to alert tab 1910, now showing a briefdescription of configured alert 1922 in alerts window 1920. Ifadditional alerts were configured, alerts window 1920 might display aselectable list of configured alerts, including configured alert 1922.Once configured, alerts may be edited or deleted using buttons 1930 or1940, respectively. Edit button 1910 may re-open the configuration viewshown in FIGS. 16-18, with the drop-down menus open to receive alternateselections.

FIG. 20 shows a view 2000 of image data from multiple 3D motion sensorsmonitoring persons 2010A, 2010B, and 2010C, as might appear on a centralmonitor primary display. The configuration window has been closed,providing an unobstructed view of monitored patients. Depending upon theconfiguration for primary display, each panel 2020, 2030, and 2040 maydisplay live video, intermittent images (e.g., “still” shots from avideo data feed) and/or audio data for monitored persons 2010A, 2010B,and 2010C, respectively.

The various computerized systems and processors as described herein mayinclude, individually or collectively, and without limitation, aprocessing unit, internal system memory, and a suitable system bus forcoupling various system components, including database 118, with acontrol server. Computerized patient monitoring system 106 and/orcentral video monitoring system 116 may provide control server structureand/or function. The system bus may be any of several types of busstructures, including a memory bus or memory controller, a peripheralbus, and a local bus, using any of a variety of bus architectures. Byway of example, and not limitation, such architectures include IndustryStandard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus,Enhanced ISA (EISA) bus, Video Electronic Standards Association (VESA)local bus, and Peripheral Component Interconnect (PCI) bus.

The computerized systems typically include therein, or have access to, avariety of computer-readable media, for instance, database 118.Computer-readable media can be any available media that may be accessedby the computerized system, and includes volatile and nonvolatile media,as well as removable and non-removable media. By way of example, and notlimitation, computer-readable media may include computer-storage mediaand communication media. Computer-readable storage media may include,without limitation, volatile and nonvolatile media, as well as removableand non-removable media implemented in any method or technology forstorage of information, such as computer readable instructions, datastructures, program modules, or other data. In this regard,computer-storage media may include, but is not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVDs) or other optical disk storage, magneticcassettes, magnetic tape, magnetic disk storage, or other magneticstorage device, or any other medium which can be used to store thedesired information and which may be accessed by the control server.Computer-readable storage media excludes signals per se.

Communication media typically embodies computer readable instructions,data structures, program modules, or other data in a modulated datasignal, such as a carrier wave or other transport mechanism, and mayinclude any information delivery media. As used herein, the term“modulated data signal” refers to a signal that has one or more of itsattributes set or changed in such a manner as to encode information inthe signal. By way of example, and not limitation, communication mediaincludes wired media such as a wired network or direct-wired connection,and wireless media such as acoustic, RF, infrared, and other wirelessmedia. Combinations of any of the above also may be included within thescope of computer-readable media. The computer-readable storage mediadiscussed above, including database 118, provide storage of computerreadable instructions, data structures, program modules, and other datafor the computerized systems. Computer readable instructions embodied oncomputer-readable storage media may be accessible by unauthorizedvisitor system 100 and/or component(s) thereof, and, when executed by acomputer processor and/or server, may cause the system to functionand/or perform the methods described herein.

The computerized systems may operate in a computer network using logicalconnections to one or more remote computers. Remote computers may belocated at a variety of locations, for example, but not limited to,hospitals and other inpatient settings, veterinary environments,ambulatory settings, medical billing and financial offices, hospitaladministration settings, home health care environments, payer offices(e.g., insurance companies), home health care agencies, clinicians'offices and the clinician's home or the patient's own home or over theInternet. Clinicians may include, but are not limited to, a treatingphysician or physicians, specialists such as surgeons, radiologists,cardiologists, and oncologists, emergency medical technicians,physicians' assistants, nurse practitioners, nurses, nurses' aides,pharmacists, dieticians, microbiologists, laboratory experts, laboratorytechnologists, genetic counselors, researchers, veterinarians, students,and the like. The remote computers may also be physically located innon-traditional medical care environments so that the entire health carecommunity may be capable of integration on the network. The remotecomputers may be personal computers, servers, routers, network PCs, peerdevices, other common network nodes, or the like, and may include someor all of the elements described above in relation to the controlserver. The devices can be personal digital assistants or other likedevices.

Exemplary computer networks may include, without limitation, local areanetworks (LANs) and/or wide area networks (WANs). Such networkingenvironments are commonplace in offices, enterprise-wide computernetworks, intranets, and the Internet. When utilized in a WAN networkingenvironment, the control server may include a modem or other means forestablishing communications over the WAN, such as the Internet. In anetworked environment, program modules or portions thereof may be storedin the control server, in the database 118, or on any of the remotecomputers. For example, and not by way of limitation, variousapplication programs may reside on the memory associated with any one ormore of the remote computers. It will be appreciated by those ofordinary skill in the art that the network connections shown areexemplary and other means of establishing a communications link betweenthe computers may be utilized.

In operation, a user may enter commands and information into thecomputerized system(s) using input devices, such as a keyboard, apointing device (commonly referred to as a mouse), a trackball, a touchpad, a 3D Gesture recognition camera or motion sensor. Other inputdevices may include, without limitation, microphones, satellite dishes,scanners, or the like. In addition to or in lieu of a monitor, thecomputerized systems may include other peripheral output devices, suchas speakers and a printer.

Many other internal components of the computerized system hardware arenot shown because such components and their interconnection are wellknown. Accordingly, additional details concerning the internalconstruction of the computers that make up the computerized systems arenot further disclosed herein.

Methods and systems of embodiments of the present disclosure may beimplemented in a WINDOWS or LINUX operating system, operating inconjunction with an Internet-based delivery system, however, one ofordinary skill in the art will recognize that the described methods andsystems can be implemented in any operating system suitable forsupporting the disclosed processing and communications. As contemplatedby the language above, the methods and systems of embodiments of thepresent invention may also be implemented on a stand-alone desktop,personal computer, cellular phone, smart phone, tablet computer, PDA, orany other computing device used in a healthcare environment or any of anumber of other locations.

From the foregoing, it will be seen that this disclosure is well adaptedto attain all the ends and objects hereinabove set forth together withother advantages which are obvious and which are inherent to thestructure.

It will be understood that certain features and subcombinations are ofutility and may be employed without reference to other features andsubcombinations. This is contemplated by and is within the scope of theclaims.

Since many possible embodiments may be made of the invention withoutdeparting from the scope thereof, it is to be understood that all matterherein set forth or shown in the accompanying drawings is to beinterpreted as illustrative and not in a limiting sense.

1. A system for detecting unauthorized visitors, the system comprising:one or more 3D motion sensors located to provide the one or more 3Dmotion sensors with a view of a person and surrounding area to bemonitored, the 3D motion sensors configured to collect a series ofimages of the person and surrounding area; a computerized patientmonitoring system communicatively coupled to the one or more 3D motionsensors, the computerized monitoring system configured to identify theperson being monitored utilizing skeletal tracking, blob detection orfacial tracking between two or more images in the series of images, anddetermine whether a visitor enters the view of the one or more 3D motionsensors; and a central communication system communicatively coupled tothe computerized patient monitoring system, the central communicationsystem configured to send an alert to one or more designated recipientsif the visitor and the person are in proximity to each other.
 2. Thesystem of claim 1, further comprising a central video monitoring systemcommunicatively coupled to the computerized communication system, thecentral video monitoring system configured to display at least a portionof the series of images of the visitor.
 3. The system of claim 2,wherein the computerized patient monitoring system is further configuredto identify a plurality of reference points on the face of the visitorand to compare positions, distances between, sizes, or shapes of theplurality of the reference points to positions, distances between,sizes, or shapes of a plurality of registered reference points on theface of registered visitors to determine if the visitor is a registeredvisitor, the plurality of registered reference points on the face ofregistered visitors being stored in a database.
 4. The system of claim1, further comprising determining the visitor and the person are inproximity to each other.
 5. The system of claim 2, wherein the centralvideo monitoring system comprises a primary display and an alertdisplay.
 6. The system of claim 3, wherein if the computerized patientmonitoring system detects an unauthorized visitor, the centralcommunication system sends an alert to the central video monitoringsystem, and the central video monitoring system moves a display of atleast a portion of the series of images of the visitor from the primarydisplay to the alert display.
 7. A method for detecting unauthorizedvisitors, the method comprising: receiving from a 3D motion sensor animage of at least two persons detected in a room of a patient, a methodof detecting the at least two persons comprising skeletal tracking, blobdetection, or facial tracking; determining the at least two persons arein proximity to each other; and alerting one or more designatedrecipients based on the at least two persons being in proximity to eachother.
 8. The method of claim 7, further comprising determining one ofthe at least two persons is a caregiver for the patient.
 9. The methodof claim 7, further comprising determining one of the at least twopersons is an authorized visitor for the patient.
 10. The method ofclaim 7, further comprising determining one of the at least two personsis an unauthorized visitor for the patient.
 11. The method of claim 10,further comprising alerting a designated recipient of the unauthorizedvisitor.
 12. The method of claim 7, further comprising suppressing thealert if one of the at least two persons is a caregiver for the patientor an authorized visitor for the patient.
 13. The method of claim 11,further comprising alerting a central video monitoring system of theunauthorized visitor being within the designated proximity to thepatient.
 14. The method of claim 13, further comprising communicatingthe image of the unauthorized visitor to the central video monitoringsystem.
 15. The method of claim 7, wherein images for a plurality ofpeople being monitored are displayed on a primary display at a centralvideo monitoring system.
 16. Computer-readable storage media havingembodied thereon instructions which, when executed by one or morecomputer processors, cause the processors to: receive from a 3D motionsensor an image of a person detected in a room of a patient, the personbeing in proximity to the patient; detect a signal from an electronictransmitter corresponding to the person detected in the room of thepatient; determine, based on the detecting, if the person is aregistered visitor; and alert one or more designated recipients if theperson is not a registered visitor.
 17. The computer-readable storagemedia of claim 16, wherein the instructions further cause the one ormore computer processors to register the person if the person is not aregistered visitor.
 18. The computer-readable storage media of claim 16,wherein the instructions further cause the one or more computerprocessors to display series of images for a plurality of people beingmonitored on a primary display at a central video monitoring system. 19.The computer-readable storage media of claim 18, wherein theinstructions further cause the one or more computer processors to alertthe central video monitoring system if the person is determined to be anunauthorized visitor.
 20. The computer-readable storage media of claim19, wherein the instructions further cause the one or more computerprocessors to, upon receiving the alert, cause the central videomonitoring system to duplicate the display of the series of imagesassociated with the alert on a central video monitoring system alertdisplay.