Systems and methods for biometric tamper detection

ABSTRACT

Various embodiments provide systems and methods for detecting tampering with a monitoring device using biometric data.

BACKGROUND OF THE INVENTION

Various embodiments provide systems and methods for detecting tamperingwith a monitoring device using biometric data.

Large numbers of individuals are currently monitored as part of parolerequirements or other requirements. Such monitoring allows a monitoringagency to determine whether the individual is engaging in acceptablepatterns of behavior, and where an unacceptable behavior is identifiedto stop such behavior going forward.

Thus, there exists a need in the art for more advanced approaches,devices and systems for monitoring.

BRIEF SUMMARY OF THE INVENTION

Various embodiments provide systems and methods for detecting tamperingwith a monitoring device using biometric data.

This summary provides only a general outline of some embodiments. Manyother objects, features, advantages and other embodiments will becomemore fully apparent from the following detailed description, theappended claims and the accompanying drawings and figures.

BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the various embodiments may be realized byreference to the figures which are described in remaining portions ofthe specification. In the figures, similar reference numerals are usedthroughout several drawings to refer to similar components. In someinstances, a sub-label consisting of a lower-case letter is associatedwith a reference numeral to denote one of multiple similar components.When reference is made to a reference numeral without specification toan existing sub-label, it is intended to refer to all such multiplesimilar components.

FIG. 1 a is a block diagram illustrating a monitoring system including auser attached monitor device and a central monitoring station inaccordance with various embodiments;

FIG. 1 b is a block diagram of a user attached monitor device includinga biometric tamper detection module in accordance with some embodiments;

FIG. 1 c shows a user attached monitor device with an attachment elementfor attaching the user attached monitor device to a limb of anindividual in accordance with various embodiments;

FIG. 2 is a flow diagram showing a method for tamper detection using acombination of strap continuity and one or more biometrically senseddata in accordance with one or more embodiments;

FIG. 3 is a flow diagram 300 shows a method for tamper detection using acombination of strap continuity, a passive biometric data, and an activebiometric data in accordance with some embodiments

FIG. 4 is a flow diagram showing a method for tamper detection using acombination of at least one sensed, passive biometric data and at leastone sensed, active biometric data in accordance with one or moreembodiments;

FIG. 5 is a flow diagram showing the tamper detection method of FIG. 3or FIG. 4 tailored to use finger print recognition as secondary testingusing sensed, active biometric data in accordance with variousembodiments;

FIG. 6 is a flow diagram showing the tamper detection method of FIG. 3or FIG. 4 tailored to use electrocardiogram recognition as secondarytesting using sensed, active biometric data in accordance with someembodiments;

FIG. 7 is a flow diagram showing the tamper detection method of FIG. 3or FIG. 4 tailored to use facial recognition as secondary testing usingsensed, active biometric data in accordance with various embodiments;and

FIG. 8 is a flow diagram showing the tamper detection method of FIG. 3or FIG. 4 tailored to use a combination of two or more sensed, activebiometric data as part of secondary testing in accordance with someembodiments.

DETAILED DESCRIPTION OF THE INVENTION

Various embodiments provide systems and methods for providing check-inservices for monitored individuals.

It has been found that returning offenders to society after being lockedup in a secure facility with little if any control of their day to dayactivities is often unsuccessful. It is often helpful to have, forexample, a parole officer monitors their movements and activities for aperiod of time as they reenter society. In some cases, the paroleofficer is aided by a tracking device attached to the individual beingmonitored. However, this is costly as a parole officer must besignificantly involved in monitoring and responding to situations. Someembodiments disclosed herein reduce the interaction between the trackingdevice and the parole officer.

Various embodiments provide methods for monitoring that includeproviding a user attached monitor device. The user attached monitordevice includes: a strap operable to secure the user attached monitordevice to a wrist of a monitored individual; a first sensor fordetecting a sensed, passive biometric data; and a second sensor fordetecting a sensed, active biometric data. In some cases, the firstsensor includes one or more of: a pulse sensor; a blood oxygen sensory,a proximity sensor, a body temperature sensor, and/or a motion sensor.The method further includes: receiving the sensed, passive biometricdata; based at least in part upon the sensed, passive biometric data,requesting the monitored individual engage the user attached monitordevice to enable the second sensor to sense the sensed, active biometricdata; and determining a tamper status of the user attached monitordevice based at least in part on at least one of the sensed, passivebiometric data and the sensed, active biometric data. In some instancesof the aforementioned embodiments, the methods further include reportingthe tamper status to a central monitor station via a wirelesscommunication network.

In various instances of the aforementioned embodiments, the sensed,passive biometric data is a pulse rate of the monitored individual. Insome instances of the aforementioned embodiments, the sensed, activebiometric data is one or more of: a finger print of the monitoredindividual, a face image of the monitored individual, and/or anelectrocardiogram of the monitored individual. In some cases, the firstsensor is a pulse sensor. In various cases, the second sensor includesone or more of: a finger print sensor, an image sensor, and/or anelectrocardiogram sensor.

In some instances of the aforementioned embodiments, the user attachedmonitor device further includes a continuity-based tamper sensorincluding a conductive element (e.g., electrically conductive and/oroptically conductive) extending through the strap. In some suchinstances, the methods further include: detecting a continuity statususing the continuity-based tamper sensor; and determining the tamperstatus of the user attached monitor device based at least in part on acombination of the continuity status and at least one of the sensed,passive biometric data and the sensed, active biometric data. In variousinstances of the aforementioned embodiments, the requesting themonitored individual engage the user attached monitor device includesalerting the monitored individual of a requested test via one or moreof: a display on the user attached monitor device; a vibrator on theuser attached monitor device; and a speaker on the user attached monitordevice. In some instances of the aforementioned embodiments, requestingthe monitored individual engage the user attached monitor deviceincludes instructions provided via the display of the user attachedmonitor device guiding the monitored individual on how to engage theuser attached monitor device to perform the requested test.

Other embodiments provide monitoring systems that include a userattached monitor device. The user attached monitor device includes: astrap configured to secure the user attached monitor device to a wristof a monitored individual; a first sensor for detecting a sensed,passive biometric data; a second sensor for detecting a sensed, activebiometric data; a processor; and a computer readable medium. Thecomputer readable medium includes non-transitory instructions executableby the processor to: receive the sensed, passive biometric data; basedat least in part upon the sensed, passive biometric data, requesting themonitored individual engage the user attached monitor device to enablethe second sensor to sense the sensed, active biometric data; anddetermine a tamper status of the user attached monitor device based atleast in part on at least one of the sensed, passive biometric data andthe sensed, active biometric data. In some cases, the first sensorincludes one or more of: a pulse sensor; a blood oxygen sensor, aproximity sensor, a body temperature sensor, and/or a motion sensor.

Turning to FIG. 1 a , a block diagram illustrates a monitoring system100 including a user attached monitor device 110 and a centralmonitoring station 160. Central monitoring station 160 is wirelesslycoupled to user attached monitor device 110 via one or more wide areawireless (e.g., cellular telephone network, Internet via a Wi-Fi accesspoint, or the like) communication networks 150.

Central monitoring station 160 may be any location, device or systemwhere location data and/or other types of data are received, includingby way of non-limiting example: a cellular/smart phone, an emailaccount, a website, a network database, and a memory device. Thelocation data and/or other types of data are stored by centralmonitoring station 160 and is retrievable by a monitor, such as aparent, guardian, parole officer, court liaison, spouse, friend, orother authorized group or individual. In this manner, the monitor isable to respond appropriately to detected activity of a monitoredindividual. In some cases, the monitor is able to retrieve the locationdata and/or other data types via a user interaction system 185 which maybe, but is not limited to, a network connected user interface devicecommunicatively coupled via a network to central monitoring station 160and/or directly to user attached monitor device 110 via wide areawireless network 150.

Central monitoring station 160 may include a server supported website,which may be supported by a server system comprising one or morephysical servers, each having a processor, a memory, an operatingsystem, input/output interfaces, and network interfaces, all known inthe art, coupled to the network. The server supported website comprisesone or more interactive web portals through which the monitor maymonitor the location of the monitored individual in accordance with thedescribed embodiments. In particular, the interactive web portals mayenable the monitor to retrieve the location and user identification dataof one or more monitored individuals, set or modify ‘check-in’schedules, and/or set or modify preferences. The interactive web portalsare accessible via a personal computing device, such as for example, ahome computer, laptop, tablet, and/or smart phone.

In some embodiments, the server supported website comprises a mobilewebsite or mobile application accessible via a software application on amobile device (e.g. smart phone). The mobile website may be a modifiedversion of the server supported website with limited or additionalcapabilities suited for mobile location monitoring.

Central monitoring station 160 is communicably coupled to a tamperdetection and processing database 1020. Tamper detection and processingdatabase 1020 includes a variety of data corresponding to a monitoredindividual including, but not limited to, previous tamper status, devicehealth reports, and/or previously indicated possible device errors andpossible device tampers. Based upon the disclosure provided herein, oneof ordinary skill in the art will recognize other data related to amonitored individual that may be maintained in tamper detection andprocessing database 1020. In addition, tamper detection and processingdatabase 1020 may include instructions executable by central monitoringstation 160 to effectuate various monitoring and/or recording processesthat may be executed on central monitoring station 160 and/or downloadedto user attached monitor device 110 for execution by local user attachedmonitor device 110.

User attached monitor device 110 includes a location sensor that sensesthe location of the device and generates a location data. For example,when user attached monitor device 110 is capable of receiving wirelessglobal navigation satellite system (hereinafter “GNSS”) locationinformation 136, 138, 139 from a sufficient number of GPS or GNSSsatellites 145 respectively, user attached monitor device may use thereceived wireless GNSS location information to calculate or otherwisedetermine the location of a human subject to whom user attached monitordevice 110 is attached. Global positioning system (hereinafter “GPS”) isone example of a GNSS location system. While GPS is used in the specificembodiments discussed herein, it is recognized that GPS may be replacedby any type of GNSS system. In some instances, this location includeslatitude, longitude, and elevation. It should be noted that other typesof earth-based triangulation may be used in accordance with differentembodiments of the present invention. For example, other cellphone-based triangulation, UHF band triangulation such as, for example,long range (hereinafter “LoRa”) triangulation signals. Based on thedisclosure provided herein, one of ordinary skill in the art willrecognize other types of earth-based triangulation that may be used. Thelocation data may comprise one or more of, but is not limited to: globalpositioning system (“GPS”) data, Assisted GPS (“A-GPS”) data, AdvancedForward Link Trilateration (“AFLT”) data, and/or cell towertriangulation data. Where GPS is used, user attached monitor device 110receives location information from three or more GPS or GNSS satellites145 via respective communication links 136, 138, 139. The location dataand/or other data gathered by user attached monitor device 110 iswirelessly transmitted to central monitoring station 160 via wide areawireless network 150 accessed via a wireless link 135.

In some embodiments, user attached monitor device 110 may furtherinclude a biometric tamper detection module 1010 that can, among otherthings, operate as part of an overall identification sensor generatinguser identification data for identifying the monitored individual inassociation with the generation of the location data. The useridentification data may comprise one or more of: image data, video data,biometric data (e.g. fingerprint, DNA, retinal scan, facial recognition,electrocardiogram (ECG), or the like), or any other type of data thatmay be used to verify the identity of the monitored individual at ornear the time the location data is generated. The user identificationsensor may comprise one or more of: an image sensor camera, microphone,heat sensor, biometric data sensor, or any other type of device capableof sensing/generating the aforementioned types of user identificationdata. Biometric tamper detection module 1010 assembles one or moreelements of data gathered by motion detector 152, microphone 1002, imagesensor 1003, pulse/ECG sensor 1001, finger print sensor 1004, and/or anoxygen/temperature sensor 1011 into a user identification package whichis forwarded to central monitoring station 160 via wireless transceivercircuitry 168.

Further, biometric tamper detection module 1010 is configured to receiveinputs from one or more biometric sensors that are used in combinationto determine whether someone has tampered with user attached monitordevice 110. In particular, biometric tamper detection module 1010assembles one or more elements of data gathered by motion detector 152,microphone 1002, image sensor 1003, pulse/ECG sensor 1001, finger printsensor 1004, and/or oxygen/temperature sensor 1011 into a useridentification package which is forwarded to central monitoring station160 via wireless transceiver circuitry 168.

User attached monitor device 110 further includes a memory communicablycoupled to a control unit—which is also communicatively coupled to thelocation sensor, the identification sensor, the biometric tamperdetection module, and the wireless transceiver—for controlling theoperations thereof in accordance with the functionalities describedherein. The memory may include non-transient instructions (e.g.,software-based or firmware-based instructions) executable by the controlunit to perform and/or enable various functions associated with userattached monitor device 110. User attached monitor device 110 mayinclude a strap (not shown) which can be wrapped around a limb or torsoof the monitored individual to secure user attached monitor device 110to the monitored individual. The strap and/or other parts of userattached monitor device includes one or more tamper circuits and/orsensors that allow for a determination as to whether the device has beenremoved or otherwise tampered. Examples of a strap and tamper detectioncircuitry that may be used in relation to various embodiments discussedherein are described in U.S. Pat. No. 9,355,579 entitled “Methods forImage Based Tamper Detection”, and filed by Buck et al. on Sep. 15,2014; and US Pat. Pub. No. US 2017-0270778 A1 entitled “Systems andMethods for Improved Monitor Attachment”, and filed by Melton et al. onMar. 21, 2016. Both of the aforementioned references are incorporatedherein by reference for all purposes. Based upon the disclosure providedherein, one of ordinary skill in the art will recognize a variety ofstraps, tamper circuits, tamper devices, and/or attachment and tamperdetection approaches that may be used in relation to variousembodiments. User attached monitor device 110 may include a Wi-Fitransceiver capable of receiving information from one or more Wi-Fiaccess points 187 that may be used to identify location via a Wi-Ficommunication link. To perform such WiFi-based location, WiFi receiver188 scans to identify WiFi access points 187. This scan information isprovided to controller circuit 167, which in turn provides the scaninformation to a third-party geolocation service (not shown) via widearea transceiver 168 and wide area network 150. In turn, the third-partygeolocation service returns a location.

Turning to FIG. 1 b , a block diagram 194 of user attached monitordevice 110 is shown in accordance with some embodiments. As shown, userattached monitor device 110 includes a device ID 161 that may bemaintained in a memory 165, and is thus accessible by a controllercircuit 167. Controller circuit 167 is able to interact with a GPSreceiver 162 and memory 165 at times for storing and generating recordsof successively determined location data. Similarly, controller circuit167 is able to interact with a Wi-Fi receiver 188 and memory 165 attimes for storing and generating records of successively determinedWi-Fi access point identifications and signal strength. In some cases,memory 165 may include non-transient instructions (e.g., software-basedor firmware-based instructions) executable by controller circuit 167 toperform and/or enable various functions associated with user attachedmonitor device 110. As user attached monitor device 110 comes withinrange of one or more Wi-Fi access points (e.g., Wi-Fi access points187), Wi-Fi receiver 188 senses the signal provided by the respectiveWi-Fi access points, and provides an identification of the respectiveWi-Fi access point and a signal strength of the signal received from theWi-Fi access point to Wi-Fi receiver 188. This information is providedto controller circuit 167 which stores the information to memory 165.

Where user attached monitor device 110 is operating in a standard mode,controller circuit 167 causes an update and reporting of the location ofuser attached monitor device 110 via a wide area transceiver 168 andwide area communication network 150. In some embodiments, wide areatransceiver 168 is a cellular telephone transceiver. In some cases, thelocation data is time stamped. In contrast, where user attached monitordevice 110 is within range of a public Wi-Fi access point, reporting thelocation of user attached monitor device 110 may be done via the publicWi-Fi access point in place of the cellular communication link.

Which technologies are used to update the location of user attachedmonitor device 110 may be selected either by default, by programmingfrom central monitor station 160, or based upon sensed scenarios withcorresponding pre-determined selections. For example, it may bedetermined whether sufficient battery power as reported by power status196 remains in user attached monitor device 110 to support a particularposition determination technology. Where insufficient power remains, theparticular technology is disabled. In some cases, a maximum cost ofresolving location may be set for user attached monitor device 110. Forexample, resolving Wi-Fi location data may incur a per transaction costto have a third-party service provider resolve the location information.When a maximum number of resolution requests have been issued, the Wi-Fiposition determination technology may be disabled. Further, it may bedetermined whether the likelihood that a particular positiondetermination technology will be capable of providing meaningfullocation information. For example, where user attached monitor device110 is moved indoors, GPS receiver 162 may be disabled to save power.Alternatively, where the tracking device is traveling at relatively highspeeds, the Wi-Fi receiver 188 may be disabled. As yet another example,where cellular phone jamming is occurring, support for cell towertriangulation position determination may be disabled. As yet anotherexample, where GPS jamming is occurring, GPS receiver 162 may bedisabled. As yet another example, where user attached monitor device 110is stationary, the lowest cost (from both a monetary and powerstandpoint) tracking may be enabled while all other technologies aredisabled. Which position determination technologies are used may bebased upon a zone in which a tracking device is located. Some zones maybe rich in Wi-Fi access points and in such zones Wi-Fi technology may beused. Otherwise, another technology such as cell tower triangulation orGPS may be used. Based upon the disclosure provided herein, one ofordinary skill in the art will recognize other scenarios andcorresponding combinations of technologies may be best.

Controller circuit 167 of user attached monitor device 110 at timesfunctions in conjunction with wide area transceiver 168 to send andreceive data and signals through wide area communication network 150.This link at times is useful for passing information and/or controlsignals between a central monitoring system (not shown) and userattached monitor device 110. The information transmitted may include,but is not limited to, location information, tamper information,measured alcohol information, one or more passive or active impairmenttests applied to the monitored individual, and information about thestatus of user attached monitor device 110. Based on the disclosureprovided herein, one of ordinary skill in the art will recognize avariety of information that may be transferred via wide areacommunication network 150.

Various embodiments of user attached monitor device 110 include avariety of sensors capable of determining the status of user attachedmonitor device 110, and of the individual associated therewith. Forexample, a status monitor 166 may include one or more of the followingsubcomponents: power status sensor 196 capable of indicating a powerstatus of user attached monitor device 110, a pulse/ECG sensor 1001operable to sense pulse rate of the monitored individual and anelectrocardiogram unique to the monitored individual based uponelectrodes (not shown) in contact with the skin of the monitoredindividual, an image sensor 1003 (e.g., camera) operable to capture animage of the monitored individual when user attached monitor device 110is properly positioned, and a finger print sensor 1004 operable to sensethe print of a finger placed on a display 159 of user attached monitordevice 110. The power status may be expressed, for example as apercentage of battery life remaining. Based upon the disclosure providedherein, one of ordinary skill in the art will recognize a variety offorms in which power status may be expressed. The pulse rate may beexpressed in beats per minute and the ECG may be shown visually viadisplay 159. Based upon the disclosure provided herein, one of ordinaryskill in the art will recognize a variety of forms in which pulse rateand/or ECG rate may be expressed.

In addition, user attached monitor device 110 includes a set ofshielding sensors 169 that are capable of determining whether userattached monitor device 110 is being shielded from receiving GPS signalsand/or if GPS jamming is ongoing, a set of device health indicators 154,a physical tamper sensor 151 capable of determining whether unauthorizedaccess to user attached monitor device 110 has occurred or whether userattached monitor device 110 has been removed from an associatedindividual being monitored, a motion/proximity sensor 152 capable ofdetermining whether user attached monitor device 110 is moving and/orwhether it is within proximity of an individual associated with userdetached monitor device 2095, and/or an alcohol sensor 153. Such analcohol sensor may be any alcohol sensor capable of estimating an amountof alcohol in the individual being monitored. Based upon the disclosureprovided herein, one of ordinary skill in the art will recognize avariety of alcohol sensors and corresponding alcohol sensing circuitrythat may be used in relation to different embodiments. In some cases,motion/proximity sensor 152 includes one or more accelerometer sensorsand/or gyro sensors that are capable of accurately sensing motion of themonitored individual. In some cases, the detected motion information isused to quantify the gait of the monitored individual or balance of themonitored individual as they move or perform a particular task. Inaddition, motion/proximity sensor 152 includes sensors capable ofdetermining a proximity of user attached monitor device 110 to amonitored individual to which the device is assigned. This informationmay be used to assure that the monitored individual is wearing userattached monitor device 110. Based on the disclosure provided herein,one of ordinary skill in the art will recognize a variety of shieldingsensors, a variety of device health transducers and indicators, avariety of tamper sensors, various different types of motion sensors,different proximity to human sensors, and various human body physicalmeasurement sensors or transducers that may be incorporated into userattached monitor device 110 according to various different instancesand/or embodiments.

A user input 1005 allows for a user of user attached monitor device 110to provide information to user attached monitor device 110. User input1005 may include a push button, a turning knob, and/or a touchscreendisplay (integrated as part of display 159) depending upon theparticular implementation. A speaker and microphone 1002 are includedthat are capable of providing an audio sound audible to a user of userattached monitor device 110 and of accepting audio. A vibrator 1006 isincluded that is capable of making user attached monitor device 110vibrate to alert a user of user attached monitor device. Each ofvibrator 1006, speaker 1002, user input 1005, and display 159 iscommunicatively coupled to memory 124 and/or a controller circuit 167for controlling the operations thereof.

A schedule of check-in times (either periodic or random) may bedownloaded to memory 165 by central monitoring station 160 via wirelesslink 135. A monitored individual wearing user attached monitor device110 may be alerted by one or more of: a visual prompt via display 159,an audio prompt via speaker 1002, and a tactile prompt via vibrator1006. In various cases, controller circuit 167 is part of an integratedcircuit. In one or more cases, memory 165 is included in an integratedcircuit with controller circuit 167. In various cases, memory 165 mayinclude non-transient instructions (e.g., software or firmware-basedbased instructions) executable by controller circuit 167 to performand/or enable various functions associated with user attached monitordevice 110. In some embodiments, alerting the monitored individualinvolves a prompt that includes an e-mail or text message generated bycentral monitoring station 160 (e.g. the server supported website) andtransmitted to the e-mail account or cellular phone number correspondingto user attached monitor device 110. In particular embodiments, such aprompt may include a ‘post’ on the user's ‘wall,’ ‘feed,’ or othersocial networking privilege. In some embodiments, the prompt maycomprise an automated or live phone call to the monitored individual.

Turning to FIG. 1 c , a sensing device 2065 is shown with an exampleattachment element 2090 connected at opposite ends of sensing device2065 (i.e., a first end 2096 and a second end 2098). Attachment element2090 has an outer surface 2092 and an inner surface 2091. Attachmentelement 2090 is operable to securely attach a user attached monitordevice 2095 (i.e., a combination of sensing device 2065 and attachmentelement 2090) to a limb of an individual in accordance with someembodiments. One or more electrodes 2081, 2082 are formed into innersurface 2091 such that they are in close proximity to the skin of themonitored individual when user attached monitor device 2095 is attachedto the monitored individual. In some cases, attachment element 2090 istailored to attached to a wrist of a monitored individual. In variousembodiments, attachment element 2090 includes electrically and/oroptically conductive material used to make a conductive connection fromfirst end 2096 to second end 2098 through attachment element 2090 and isused in relation to determining whether user attached monitor device2095 remains attached and/or has been tampered with. While FIG. 1 cshows a strap as an example attachment element, based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize other types of attachment elements that may be used inrelation to different embodiments. In other embodiments, attachmentelement 2090 is long enough to attach around the torso of the monitoredindividual and is sufficiently flexible to allow expansion andcontraction of the chest of the monitored individual as they breath.Such expansion and contraction may be used to sense respiration rate ofthe monitored individual.

Sensing device 2065 includes a case 2089 in which various electroniccomponents are maintained. In addition, sensing device 2065 includes abutton 2083, a radial dial 2085, a display 2087 (which may be atouchscreen display), and a combination speaker, microphone, and imagesensor 2079. Together, sensing device 2065 includes a button 2083, aradial dial 2085, a display 2087, a combination speaker, microphone, andimage sensor 2079, electrodes 2081, 2082 provide the user interface foruser attached monitor device 2065 and support the functionality of thevarious sensors discussed above in relation to FIG. 1 b . Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize a variety of inputs and outputs that may be incorporated intouser attached monitor device 2095 to provide the functionality discussedherein.

Turning to FIG. 2 , a flow diagram 200 shows a method for tamperdetection using a combination of strap continuity and one or morebiometrically sensed data in accordance with one or more embodiments.Following flow diagram 200, it is determined whether a continuitycircuit in a strap securing a user attached monitor device 110 to a limbof a monitored individual indicates that the strap is properly connected(block 205). As discussed above, some embodiments of user attachedmonitor device 110 includes a tamper sensor that detects a charge orsenses a light passing through an electrically and/or opticallyconductive material used to make a conductive connection from a firstend of the strap to a second end of the strap. When the strap isproperly connected around the limb of the monitored individual, a chargeplaced on one end of the strap is detected on the other end of the strap(or a light placed on one end of the strap is visible at the other endof the strap). Thus, determining whether the strap is connected includesdetermining whether the expected charge or light placed on one end ofthe strap is sensed on the other end of the strap. Where the charge orlight is not sensed, the strap is considered disconnected.Alternatively, where the charge or light is detected, the strap isconsidered connected. While this embodiment is discussed as using acontinuity-based approach to determine strap connection, based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize other approaches for determining whether a strap is connectedthat may be used in relation to different embodiments.

Where the strap is determined to have been disconnected or cut (block205), a tamper is reported (block 207). Reporting the tamper may includestoring information associated with the tamper to a memory local to userattached monitor device 110, and when desired transmitting thatinformation to central monitor station 160 via wireless wide areanetwork 150. In some cases, the tamper information is immediatelytransmitted. In other cases, the tamper information is transmitted at apredetermined communication time along with other information that is tobe transmitted. The tamper information may include, but is not limitedto, a time stamp indicating when the tamper condition was detected, andthe cause of the tamper (e.g., strap disconnected). Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize a variety of information that may be transmitted as part ofthe tamper information.

Alternatively, where the strap is determined not to have beendisconnected or cut (block 205), biometric data is passively sensed(block 210). Some biometric data, such as, for example, pulse rate, canbe sensed without alerting the monitored individual and requiring themto engage in a biometric test. The passively sensed biometric data istested to determine if it is valid (block 230). Thus, for example, wherethe sensed biometric data is a pulse rate, the sensed pulse rate data iscompared with both a lower value and an upper value to assure that thesensed data is within a range of possible pulse rates. The upper andlower values of the range may be specifically selected for the monitoredindividual, or may be generic values for a large population ofindividuals. Based upon the disclosure provided herein, one of ordinaryskill in the art will recognize other passively obtained biometric dataand/or comparison ranges that can be used to validate the sensed data.

Where the sensed biometric data is not valid (block 230), a possibletamper, strap connected sensor, or biometric sensor failure is reported(block 232). Again, the reporting may include storing informationassociated with the tamper to a memory local to user attached monitordevice 110, and when desired transmitting that information to centralmonitor station 160 via wireless wide area network 150. The tamperinformation may include, but is not limited to, a time stamp indicatingwhen the tamper condition was detected, and the cause of the tamper(e.g., strap connected, but invalid biometric data sensed). Thus, forexample, where the biometric data is a pulse rate, the tamperinformation may include, but is not limited to, a time stamp indicatingwhen the tamper condition was detected, the cause of the tamper (e.g.,strap connected, but pulse rate outside of an expected range), and thesensed pulse rate. Based upon the disclosure provided herein, one ofordinary skill in the art will recognize a variety of information thatmay be transmitted as part of the tamper information.

Turning to FIG. 3 , a flow diagram 300 shows a method for tamperdetection using a combination of strap continuity, a passive biometricdata, and an active biometric data in accordance with some embodiments.Following flow diagram 300, it is determined whether a continuitycircuit in a strap securing a user attached monitor device 110 to a limbof a monitored individual indicates that the strap is properly connected(block 305). As discussed above, some embodiments of user attachedmonitor device 110 includes a tamper sensor that detects a charge orsenses a light passing through an electrically and/or opticallyconductive material used to make a conductive connection from a firstend of the strap to a second end of the strap. When the strap isproperly connected around the limb of the monitored individual, a chargeplaced on one end of the strap is detected on the other end of the strap(or a light placed on one end of the strap is visible at the other endof the strap). Thus, determining whether the strap is connected includesdetermining whether the expected charge or light placed on one end ofthe strap is sensed on the other end of the strap. Where the charge orlight is not sensed, the strap is considered disconnected.Alternatively, where the charge or light is detected, the strap isconsidered connected. While this embodiment is discussed as using acontinuity-based approach to determine strap connection, based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize other approaches for determining whether a strap is connectedthat may be used in relation to different embodiments.

Where the strap is determined to have been disconnected or cut (block305), secondary testing based upon sensed, active biometric data isperformed (block 355). As used herein, the phrase “active biometricdata” is biometric data that is gathered upon active participation bythe monitored individual. As used herein, the phrase “passive biometricdata” is biometric data that is gathered without active participation bythe monitored individual. As an example, “active biometric data” mayinclude an image of a monitored individual's face that is collectedafter alerting the monitored individual to take an image of their faceusing an image sensor on a user attached monitor device. As anotherexample, “passive biometric data” may include an image of a monitoredindividual's face that is collected without alerting the monitoredindividual that an image is being taken, but rather by monitoringinformation presented to the image sensor and automatically capturing animage of the monitored individual whenever user attached monitor device110 is oriented such that a face is within view of the image sensor ofuser attached monitor device 110. As another example, “passive biometricdata” may include a pulse rate of a monitored individual that isautomatically sensed using sensors in user attached monitor device 110.As yet another example, “active biometric data” may include a fingerprint of a monitored individual that is collected after alerting themonitored individual to take a finger print using user attached monitordevice 110. As yet a further example, “passive biometric data” mayinclude an ECG of a monitored individual that is automatically sensedusing sensors in user attached monitor device 110. As yet anotherexample, “active biometric data” may include an ECG of a monitoredindividual that is collected after alerting the monitored individual totake an ECG using user attached monitor device 110. Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize a variety of active and passive sensed biometric data that maybe used in relation to different embodiments. Block 335 is shown indashed lines as it includes a variety of functions and/or processes thatare further discussed below in relation to FIGS. 5-8 .

The processes of block 355 return either: (1) a “Timeout” conditionindicating that the monitored individual failed to engage in the alertedactive biometric data gathering within an allowed time period, (2) a“Mismatch” condition indicating that the sensed, active biometric datadid not match what was expected, or (3) a “Match” condition indicatingthat the sensed, active biometric data matched what was expected. Theseconditions are further discussed below in relation to FIGS. 5-8 . It isdetermined whether a Timeout or Mismatch condition was returned from thesecondary testing of block 355 (block 360). Where either a Timeout or aMismatch condition is returned (block 360), a tamper is reported (block362). Reporting the tamper may include storing information associatedwith the tamper to a memory local to user attached monitor device 110,and when desired transmitting that information to central monitorstation 160 via wireless wide area network 150. In some cases, thetamper information is immediately transmitted. In other cases, thetamper information is transmitted at a predetermined communication timealong with other information that is to be transmitted. The tamperinformation may include, but is not limited to, a time stamp indicatingwhen the tamper condition was detected, and the cause of the tamper(e.g., strap disconnected and Mismatch condition, or strap disconnectedand Timeout condition). Based upon the disclosure provided herein, oneof ordinary skill in the art will recognize a variety of informationthat may be transmitted as part of the tamper information.

Alternatively, where the strap is determined not to have beendisconnected or cut (block 305), biometric data is passively sensed(i.e., sensed, passive biometric data)(block 310). As used herein,“sensed, passive biometric data” is used in its broadest sense to meanbiometric data sensed from an individual wearing a sensing devicewithout alerting the monitored individual and requiring them to engagein a biometric test. As just some examples, sensed, passive biometricdata may include, but is not limited to, a pulse rate, a blood oxygenlevel, an external body temperature, motion of the body, and/orproximity of a sensing device to the body of the monitored individual.The passively sensed biometric data is tested to determine if it isvalid (block 330). Thus, for example, where the sensed biometric data isa pulse rate, the sensed pulse rate data is compared with both a lowervalue and an upper value to assure that the sensed data is within arange of possible pulse rates. The upper and lower values of the rangemay be specifically selected for the monitored individual, or may begeneric values for a large population of individuals. Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize other passively obtained biometric data and/or comparisonranges that can be used to validate the sensed data.

Where the sensed, passive biometric data is not valid (block 330), apossible tamper or biometric sensor failure is reported (block 332).Again, the reporting may include storing information associated with thetamper to a memory local to user attached monitor device 110, and whendesired transmitting that information to central monitor station 160 viawireless wide area network 150. The tamper information may include, butis not limited to, a time stamp indicating when the tamper condition wasdetected, and the cause of the tamper (e.g., strap connected, butinvalid biometric data sensed). Thus, for example, where the biometricdata is a pulse rate, the tamper information may include, but is notlimited to, a time stamp indicating when the tamper condition wasdetected, the cause of the tamper (e.g., strap connected, but pulse rateoutside of an expected range), and the sensed pulse rate. Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize a variety of information that may be transmitted as part ofthe tamper information.

Turning to FIG. 4 , a flow diagram 400 shows a method for tamperdetection using a combination of at least one sensed, passive biometricdata and at least one sensed, active biometric data in accordance withone or more embodiments. Following flow diagram 400, biometric data ispassively sensed (i.e., sensed, passive biometric data)(block 405). Asjust some examples, sensed, passive biometric data may include, but isnot limited to, a pulse rate, a blood oxygen level, an external bodytemperature, motion of the body, and/or proximity of a sensing device tothe body of the monitored individual. Some biometric data, such as, forexample, pulse rate, can be sensed without alerting the monitoredindividual and requiring them to engage in a biometric test. Thepassively sensed biometric data is tested to determine if it is valid(block 410). Thus, for example, where the sensed biometric data is apulse rate, the sensed pulse rate data is compared with both a lowervalue and an upper value to assure that the sensed data is within arange of possible pulse rates. The upper and lower values of the rangemay be specifically selected for the monitored individual, or may begeneric values for a large population of individuals. Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize other passively obtained biometric data and/or comparisonranges that can be used to validate the sensed data.

Where the sensed, passive biometric data is not valid (block 410),secondary testing based upon sensed, active biometric data is performed(block 415). Block 415 is shown in dashed lines as it includes a varietyof functions and/or processes that are further discussed below inrelation to FIGS. 5-8 . As used herein, “sensed, active biometric data”is used in its broadest sense to mean biometric data sensed from anindividual wearing a sensing device after alerting the monitoredindividual and requiring them to engage in a biometric test. In somecases, enhanced or additional biometric data can be achieved with theaid of the monitored individual. Based upon the disclosure providedherein, one of ordinary skill in the art will recognize a variety ofbiometric data that may be sensed after alerting a monitored individual.The processes of block 355 return either: (1) a “Timeout” conditionindicating that the monitored individual failed to engage in the alertedactive biometric data gathering within an allowed time period, (2) a“Mismatch” condition indicating that the sensed, active biometric datadid not match what was expected, or (3) a “Match” condition indicatingthat the sensed, active biometric data matched what was expected. Theseconditions are further discussed below in relation to FIGS. 5-8 .

It is determined whether a Timeout or Mismatch condition was returnedfrom the secondary testing of block 415 (block 420). Where either aTimeout or a Mismatch condition is returned (block 420), a tamper isreported (block 422). Reporting the tamper may include storinginformation associated with the tamper to a memory local to userattached monitor device 110, and when desired transmitting thatinformation to central monitor station 160 via wireless wide areanetwork 150. In some cases, the tamper information is immediatelytransmitted. In other cases, the tamper information is transmitted at apredetermined communication time along with other information that is tobe transmitted. The tamper information may include, but is not limitedto, a time stamp indicating when the tamper condition was detected, andthe cause of the tamper (e.g., no pulse rate and Mismatch condition,pulse rate out of range and Mismatch condition, no pulse rate andTimeout condition, or pulse rate out of range and Timeout condition).Based upon the disclosure provided herein, one of ordinary skill in theart will recognize a variety of information that may be transmitted aspart of the tamper information.

Turning to FIG. 5 , a flow diagram 500 shows a tamper detection methodimplementing block 355 of FIG. 3 or block 415 of FIG. 4 tailored to usefinger print recognition as secondary testing using sensed, activebiometric data in accordance with some embodiments. Following flowdiagram 500, a request is made to a monitored individual to performfinger print validation using a user attached monitor device 110 (block505). The request may be made by, for example, alerting the monitoredindividual of the need to engage in secondary testing, and requestingthat the monitored individual engage the finger print functionality ofuser attached monitor device 110. The request may include detailedinstructions for how to provide finger print data including, forexample, placing their finger within view of image sensor 1003 of userattached monitor device 110. The alert may be done by displaying amessage to the monitored individual that may be visible via the displayof user attached monitor device 110. This message may be automaticallygenerated and displayed whenever secondary testing is requested.Alternatively, or in addition, an audible alarm via speaker 1002 and/ora tactile alarm via vibrator 1006 may be generated to cause themonitored individual to look at the display of user attached monitordevice. Based upon the disclosure provided herein, one of ordinary skillin the art will recognize a variety of messages, instructions, and/oralerts that may be used to encourage the monitored individual to engagein the requested gathering of sensed, active biometric data inaccordance with different embodiments.

It is determined whether the finger print of the monitored individual isreceived within a defined timeout period (block 510). In some cases, themonitored individual is given a fixed amount of time (e.g., two minutes)to provide the requested finger print via user attached monitor device110. Where the finger print is not received within a timeout period(block 510), a Timeout condition is returned (block 515).

Alternatively, where the finger print is timely received (block 510),the received finger print is compared with an expected finger print(block 520). The expected finger print may be taken at the time thatuser attached monitor device 110 was assigned to the monitoredindividual, and then stored in memory 165 of user attached monitordevice 110. In some cases, the expected finger print is gathered in thesame way that the finger print is gathered when the monitored individualis responding to a request for a finger print during a tamper monitoringoperation. Based upon the disclosure provided herein, one of ordinaryskill in the art will recognize a variety of finger print gatheringprocesses that may be used in relation to user attached monitor device110, and/or finger print comparison processes that may be used todetermine whether a gathered finger print matches an expected fingerprint in accordance with different embodiments.

Where the sensed finger print does not match the expected finger print(block 525), a Mismatch condition is returned (block 530).Alternatively, where the sensed finger print matches the expected fingerprint (block 525), a Match condition is returned (block 535). Asdiscussed above in relation to FIG. 3 and FIG. 4 , the respectiveTimeout condition, Mismatch condition, and Match condition dictate thegeneration of a tamper indication and corresponding tamper notification.

Turning to FIG. 6 , a flow diagram 600 shows another tamper detectionmethod implementing block 355 of FIG. 3 or block 415 of FIG. 4 tailoredto use electrocardiogram recognition as secondary testing using sensed,active biometric data in accordance with some embodiments. Followingflow diagram 600, a request is made to a monitored individual to performECG validation using a user attached monitor device 110 (block 605). Therequest may be made by, for example, alerting the monitored individualof the need to engage in secondary testing, and requesting that themonitored individual engage the ECG functionality of user attachedmonitor device 110. The request may include detailed instructions forhow to provide ECG data including, for example, holding a strapincluding ECG electrodes near the skin of the monitored individual. Thealert may be done by displaying a message to the monitored individualthat may be visible via the display of user attached monitor device 110.This message may be automatically generated and displayed wheneversecondary testing is requested. Alternatively, or in addition, anaudible alarm via speaker 1002 and/or a tactile alarm via vibrator 1006may be generated to cause the monitored individual to look at thedisplay of user attached monitor device. Based upon the disclosureprovided herein, one of ordinary skill in the art will recognize avariety of messages, instructions, and/or alerts that may be used toencourage the monitored individual to engage in the requested gatheringof sensed, active biometric data in accordance with differentembodiments.

It is determined whether the ECG data of the monitored individual isreceived within a defined timeout period (block 610). In some cases, themonitored individual is given a fixed amount of time (e.g., fiveminutes) to provide the requested ECG data via user attached monitordevice 110. Where the ECG data is not received within a timeout period(block 610), a Timeout condition is returned (block 615).

Alternatively, where the ECG data is timely received (block 610), thereceived ECG data is compared with an expected ECG data (block 620). Theexpected ECG data may be taken at the time that user attached monitordevice 110 was assigned to the monitored individual, and then stored inmemory 165 of user attached monitor device 110. In some cases, theexpected ECG data is gathered in the same way that the ECG data isgathered when the monitored individual is responding to a request forECG data during a tamper monitoring operation. Based upon the disclosureprovided herein, one of ordinary skill in the art will recognize avariety of ECG gathering processes that may be used in relation to userattached monitor device 110, and/or ECG data comparison processes thatmay be used to determine whether gathered ECG data matches an expectedECG data in accordance with different embodiments.

Where the sensed ECG data does not match the expected ECG data (block625), a Mismatch condition is returned (block 630). Alternatively, wherethe sensed ECG data matches the expected ECG data (block 625), a Matchcondition is returned (block 635). As discussed above in relation toFIG. 3 and FIG. 4 , the respective Timeout condition, Mismatchcondition, and Match condition dictate the generation of a tamperindication and corresponding tamper notification.

Turning to FIG. 7 , a flow diagram 700 shows yet another tamperdetection method implementing block 355 of FIG. 3 or block 415 of FIG. 4tailored to use facial recognition as secondary testing using sensed,active biometric data in accordance with various embodiments. Followingflow diagram 700, a request is made to a monitored individual to performfacial validation using a user attached monitor device 110 (block 705).The request may be made by, for example, alerting the monitoredindividual of the need to engage in secondary testing, and requestingthat the monitored individual capture an image of their face using userattached monitor device 110. The request may include detailedinstructions for how to capture a face image including, for example,holding their arm such that an image sensor in user attached monitordevice 110 is oriented to capture an image of the monitored individual'sface. The alert may be done by displaying a message to the monitoredindividual that may be visible via the display of user attached monitordevice 110. This message may be automatically generated and displayedwhenever secondary testing is requested. Alternatively, or in addition,an audible alarm via speaker 1002 and/or a tactile alarm via vibrator1006 may be generated to cause the monitored individual to look at thedisplay of user attached monitor device. Based upon the disclosureprovided herein, one of ordinary skill in the art will recognize avariety of messages, instructions, and/or alerts that may be used toencourage the monitored individual to capture a face image in therequested gathering of sensed, active biometric data in accordance withdifferent embodiments.

It is determined whether the face image of the monitored individual isreceived within a defined timeout period (block 710). In some cases, themonitored individual is given a fixed amount of time (e.g., two minutes)to provide the requested face image via user attached monitor device110. Where the face image is not received within a timeout period (block710), a Timeout condition is returned (block 715).

Alternatively, where the face image is timely received (block 710), thereceived face image is compared with an expected face image (block 720).The expected face image may be taken at the time that user attachedmonitor device 110 was assigned to the monitored individual, and thenstored in memory 165 of user attached monitor device 110. In some cases,the expected face image is captured in the same way that the face imageis gathered when the monitored individual is responding to a request fora face image during a tamper monitoring operation. Based upon thedisclosure provided herein, one of ordinary skill in the art willrecognize a variety of face image capture processes that may be used inrelation to user attached monitor device 110, and/or face imagecomparison processes that may be used to determine whether captured faceimage matches an expected face image in accordance with differentembodiments.

Where the captured face image does not match the expected face image(block 725), a Mismatch condition is returned (block 730).Alternatively, where the captured face image matches the expected faceimage (block 725), a Match condition is returned (block 735). Asdiscussed above in relation to FIG. 3 and FIG. 4 , the respectiveTimeout condition, Mismatch condition, and Match condition dictate thegeneration of a tamper indication and corresponding tamper notification.

FIG. 8 is a flow diagram showing the tamper detection method of FIG. 3or FIG. 4 tailored to use a combination of two or more sensed, activebiometric data as part of secondary testing in accordance with someembodiments. Following flow diagram 500, the processes of previouslydiscussed flow diagram 500 are performed for finger print validation(block 500). Block 500 is shown in dashed lines as it includes theprocesses discussed above in relation to FIG. 5 . It is determinedwhether the finger print validation (block 500) yielded a matched fingerprint (block 805). Where a finger print is match is found within thetimeout period (block 805), a Match condition is returned (block 810).As discussed above in relation to FIG. 3 and FIG. 4 , the Matchcondition dictates the generation of a tamper indication andcorresponding tamper notification.

Alternatively, where a finger print is match is not found within thetimeout period (block 805), the processes of previously discussed flowdiagram 600 are performed for ECG validation (block 600). Block 600 isshown in dashed lines as it includes the processes discussed above inrelation to FIG. 6 . It is determined whether the ECG validation (block600) yielded a matched ECG (block 815). Where an ECG match is foundwithin the timeout period (block 815), a Match condition is returned(block 820). As discussed above in relation to FIG. 3 and FIG. 4 , theMatch condition dictates the generation of a tamper indication andcorresponding tamper notification.

Alternatively, where an ECG match is not found within the timeout period(block 815), the processes of previously discussed flow diagram 700 areperformed for Face validation (block 700). Block 700 is shown in dashedlines as it includes the processes discussed above in relation to FIG. 7. It is determined whether the face validation (block 700) yielded amatched face image (block 825). Where a face image match is found withinthe timeout period (block 825), a Match condition is returned (block830). As discussed above in relation to FIG. 3 and FIG. 4 , the Matchcondition dictates the generation of a tamper indication andcorresponding tamper notification. Where, on the other hand, a faceimage match is not found within the timeout period (block 825), aMismatch condition is returned (block 830).

In conclusion, the present invention provides for novel systems,devices, and methods for monitoring individuals and/or assets. Whiledetailed descriptions of one or more embodiments of the invention havebeen given above, various alternatives, modifications, and equivalentswill be apparent to those skilled in the art without varying from thespirit of the invention. Therefore, the above description should not betaken as limiting the scope of the invention, which is defined by theappended claims.

What is claimed is:
 1. A method for monitoring, the method comprising: providing a user attached monitor, wherein the user attached monitor device includes: a strap operable to secure the user attached monitor device to a wrist of a monitored individual; a first sensor for detecting a sensed, passive biometric data; and a second sensor for detecting a sensed, active biometric data; a continuity-based tamper sensor including a conductive element extending through the strap; receiving the sensed, passive biometric data; based at least in part upon the sensed, passive biometric data, requesting the monitored individual engage the user attached monitor device to enable the second sensor to sense the sensed, active biometric data; detecting a continuity status using the continuity-based tamper sensor; and determining a tamper status of the user attached monitor device based at least in part on a combination of the continuity status and at least one of the sensed, passive biometric data and the sensed, active biometric data.
 2. The method of claim 1, wherein the first sensor is selected from a group consisting of: a pulse sensor; a blood oxygen sensory, a proximity sensor, a body temperature sensor, and a motion sensor.
 3. The method of claim 1, the method further comprising: reporting the tamper status to a central monitor station via a wireless communication network.
 4. The method of claim 1, wherein the sensed, passive biometric data is a pulse rate of the monitored individual.
 5. The method of claim 1, wherein the sensed, active biometric data is selected from a group consisting of: a finger print of the monitored individual, a face image of the monitored individual, and an electrocardiogram of the monitored individual.
 6. The method of claim 1, wherein the first sensor is a pulse sensor.
 7. The method of claim 1, wherein the second sensor is selected from a group consisting of: a finger print sensor, an image sensor, and an electrocardiogram sensor.
 8. The method of claim 1, wherein requesting the monitored individual engage the user attached monitor device includes alerting the monitored individual of a requested test via one or more of: a display on the user attached monitor device; a vibrator on the user attached monitor device; and a speaker on the user attached monitor device.
 9. The method of claim 1, where requesting the monitored individual engage the user attached monitor device includes instructions provided via the display of the user attached monitor device guiding the monitored individual on how to engage the user attached monitor device to perform the requested test.
 10. A monitoring system, the monitoring system comprising: a user attached monitor device including: a strap operable to secure the user attached monitor device to a wrist of a monitored individual; a first sensor for detecting a sensed, passive biometric data; a second sensor for detecting a sensed, active biometric data; a continuity-based tamper sensor including a conductive element extending through the strap; a processor; and a computer readable medium including non-transitory instructions executable by the processor to: receive the sensed, passive biometric data; based at least in part upon the sensed, passive biometric data, requesting the monitored individual engage the user attached monitor device to enable the second sensor to sense the sensed, active biometric data; detect a continuity status using the continuity-based tamper sensor; and determine a tamper status of the user attached monitor device based at least in part on a combination of the continuity status and at least one of the sensed, passive biometric data and the sensed, active biometric data.
 11. The system of claim 10, wherein the first sensor is selected from a group consisting of: a pulse sensor; a blood oxygen sensory, a proximity sensor, a body temperature sensor, and a motion sensor.
 12. The system of claim 10, the system further comprising: a central monitoring station; and wherein the non-transitory instructions are further executable to report the tamper status to a central monitoring station via a wireless communication network.
 13. The system of claim 10, wherein the sensed, passive biometric data is a pulse rate of the monitored individual.
 14. The system of claim 10, wherein the sensed, active biometric data is selected from a group consisting of: a finger print of the monitored individual, a face image of the monitored individual, and an electrocardiogram of the monitored individual.
 15. The system of claim 10, wherein the first sensor is a pulse sensor.
 16. The system of claim 10, wherein the second sensor is selected from a group consisting of: a finger print sensor, an image sensor, and an electrocardiogram sensor.
 17. The system of claim 10, wherein requesting the monitored individual engage the user attached monitor device includes alerting the monitored individual of a requested test via one or more of: a display on the user attached monitor device; a vibrator on the user attached monitor device; and a speaker on the user attached monitor device.
 18. The system of claim 10, where requesting the monitored individual engage the user attached monitor device includes instructions provided via the display of the user attached monitor device guiding the monitored individual on how to engage the user attached monitor device to perform the requested test.
 19. A monitoring system, the monitoring system comprising: a user attached monitor device including: a biometric sensor for detecting at least one of a sensed, passive biometric data or a sensed, active biometric data, and to provide a sensed biometric data; a continuity-based tamper sensor including a conductive element extending through the strap; a processor; and a computer readable medium including non-transitory instructions executable by the processor to: receive the sensed biometric data; detect a continuity status using the continuity-based tamper sensor; and determine a tamper status of the user attached monitor device based at least in part on a combination of the continuity status and the sensed biometric data and the sensed, active biometric data.
 20. The monitoring system of claim 19, wherein the sensed biometric data is a sensed, passive biometric data.
 21. The monitoring system of claim 19, wherein the sensed biometric data is a sensed, active biometric data.
 22. The monitoring system of claim 19, wherein the sensed biometric data includes both a sensed, passive biometric data and a sensed, active biometric data.
 23. The monitoring system of claim 19, wherein the biometric sensor includes an active biometric sensor selected from a group consisting of: a finger print sensor, an image sensor, and an electrocardiogram sensor.
 24. The monitoring system of claim 19, wherein the user attached monitor device further includes a strap operable to secure the user attached monitor device to a wrist of a monitored individual.
 25. The monitoring system of claim 19, wherein the biometric sensor includes a pulse sensor. 