Monitoring inmate movement with rfid

ABSTRACT

The disclosure relates to systems and methods for tracking offender movement with RFID. Such a system can include a transponder associated with an offender and a radar module configured to determine a direction of a moving object passing within range of the radar module. The system can include a radio frequency identification reader situated near the radar module and configured to transmit an interrogating signal to the transponder and receive an identifying signal in response to the transponder receiving the interrogating signal. The system can include a server configured to receive data from the radio frequency identification reader and the radar module through a network, transmit the received data to a web service through the network, and receive an alert from the web service that a monitoring rule of a plurality of monitoring rules associated with the offender was violated.

BACKGROUND INFORMATION

Officers at secure facilities can face many challenges in monitoring thewhereabouts of inmates. Such monitoring can include visual inspectionand verification on a strict schedule. Such monitoring can require theOfficers to have a detailed knowledge of which inmates can associatewith each other, and which areas of a premises the individual inmatesare permitted to occupy.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a diagram of an example of a secure facility,according to an example embodiment.

FIG. 2 illustrates a logical block diagram of an example of a networkedsystem for automated offender movement detection, according to anexample embodiment.

FIG. 3 illustrates an example of an area outfitted for automatedoffender movement detection.

FIG. 4 illustrates an example of a user interface, according to anexample embodiment.

FIG. 5 illustrates another example of a technique for automated offendermovement detection, according to an example embodiment.

FIG. 6 illustrates an example of a computer system, according to anexample embodiment.

DETAILED DESCRIPTION

Various embodiments illustrated and described herein provide solutionsto efficiently and accurately monitor or document the movement ofoffenders (e.g., inmates). These and other embodiments are described,with reference to the figures, herein.

In the following detailed description, reference is made to theaccompanying drawings that form a part hereof, and in which is shown byway of illustration specific embodiments in which the inventive subjectmatter may be practiced. These embodiments are described in sufficientdetail to enable those skilled in the art to practice them, and it is tobe understood that other embodiments may be utilized and thatstructural, logical, and electrical changes may be made withoutdeparting from the scope of the inventive subject matter.

Such embodiments of the inventive subject matter may be referred to,individually and/or collectively, herein by the term “invention” merelyfor convenience and without intending to limit the scope of thisapplication to any single invention or inventive concept if more thanone is in fact disclosed. The following description is, therefore, notto be taken in a limited sense, and the scope of the inventive subjectmatter is defined by the appended claims.

The disclosure presents methods and apparatuses for monitoring offendermovements using one or more Radio-Frequency Identification (RFID)readers. The RFID reader can scan for a transponder associated eitherdirectly or indirectly with an offender (e.g., inmate). The scanning cancause information associated with the offender associated with thetransponder to appear on a display coupled to the RFID reader. When anauthorized user scans the transponder the user can view, add, or alterthe information that is displayed when the transponder is scanned. TheRFID reader can send data collected from the scan to a web service ormiddleware for analysis. Alternatively, the RFID reader can do at leasta portion of the analysis itself, such as in embodiments where the RFIDreader includes an operating system and an application stored thereon.The information that is entered can be saved to remote or localdatabases. In this way, managing information about an offender or anitem associated with the offender can be automatically maintained andupdated. Such a system can be advantageous when implemented in adetention center, incarceration facility, mental health facility, or anyother place where information about people can be tracked or managed.

Secure facility agencies can face logistical, communication, and recordsmanagement challenges when managing offenders (e.g., incarceratedpersons). This includes processing, providing care, and collecting awide range of information about each of the offenders including adirection the offender is moving. Various embodiments illustrated anddescribed herein include systems, methods, and software to assist insuch situations. For example, typical embodiments assist in rapidrecording and monitoring a wide range of data about offenders includingposition of the offender at a given scan time and direction the offenderwas traveling at a given scan time. One or more embodiments may do so ina user-friendly and efficient manner through a networked computingenvironment.

Custodians of persons in a facility manage many responsibilitiesincluding a significant amount of documentation in order to capture datapertinent to each person they are responsible for. Custodians (e.g.,secure facility officers) may face challenges in managing persons intheir facilities, such as tracking their location. To help mitigate suchrisks, some embodiments herein include systems, methods, and softwarethat provide automated data documentation indicating a direction anoffender is moving or using progressive scanning (discussed in moredetail herein).

These and other advantages can be realized using one or more embodimentsdisclosed herein. The systems, methods, and software are now describedin more detail with reference to the drawings.

FIG. 1 illustrates a networked system 100 configured for automatedoffender documentation, according to an example embodiment. The system100 can include one or more RFID readers 102A-102F, one or moretransponders 104A-104E, or a server 108.

The RFID readers 102A-102F can be mobile (e.g., handheld) or fixed inthe area in which they are deployed. An example of a fixed RFID reader102 includes a portal-based RFID reader 102 that forces an offender 105to walk through a portal within range of the RIFD reader 102. In theexample shown in FIG. 1, RFID readers 102A-102D and 102F are fixed,while RFID reader 102E is mobile. The RFID readers 102A-102F can beassigned a name (e.g., a collection of characters, letters, numbers, orother symbols) to uniquely identify the RFID reader 102. The RFIDreaders 102A-102F can each be assigned to a specific location. The RFIDreader's location can be configured such that the RFID readers102A-102F, in aggregate, can monitor a substantial portion of thepremises in which they are deployed for the presence of a transponder104A-104D. The location of an RFID reader 102 can be determined throughglobal positioning systems (GPS) software on the RFID reader 102, alocation code stored in a database (e.g., database 222 of FIG. 2 orother computer memory), or other location to allow software services toverify the location of the RFID reader 102. In one or more embodiments,the RFID readers 102A-F can be configured to detect a transponder 104located within a specific range of the RFID reader 102A-102F. In suchembodiments, the RFID reader 102 can send an interrogating signal to atransponder 104 and receive an identifying signal in response to thetransponder 104 receiving the interrogating signal. The identifyingsignal can include a unique identifier (e.g., a specific frequency,signal shape, or other unique identifier) corresponding to thattransponder 104. The RFID reader 102 can be internal or external to abuilding on the premises in which the system 100 is deployed. Forexample, RFID readers 102A-D can be internal to a detention centerbuilding, RFID reader 102E can be either internal or external to thedetention center building, and RFID reader 102F can be external to thedetention center building, such as in a courtyard or a recreation area.

The RFID readers 102A-102F can each be assigned to a specific customer(e.g., an entity interested in using a movement or monitoring system).Such an assignment can help a data center manage information receivedfrom the RFID readers 102 (note: “102” is used to refer to RFID readersin general). The RFID readers 102A-F can be connected to a server 108 ora network 213 (see FIG. 2) through a wired or wireless connection(indicated by a lightning bolt in FIG. 1). A wired connection caninclude an Ethernet connection or other protocol operable to connect theRFID readers 102A-102F to the server or network. A wireless connectioncan include Wi-Fi, Bluetooth, Zigbee, or other protocol operable towirelessly connect the RFID readers 102A-102F to the server 108 ornetwork 213.

An RFID reader 102A-102F can be associated with one or more programmableevents 220. A programmable event 220 can include an offender head count,location verification, or other event. For example, the RFID readers102A-102F can be programmed to perform a scan at a particular time. Theresults of the scan can be sent to the server 108. The results retrievedcan be compared to a list of expected results. If the comparison showsan irregularity or a deviation from what is expected, a warning or alertcan be sent to the proper personnel (e.g., one or more custodiansresponsible for managing the person associated with deviation). Theproper personnel can then respond to the situation. In the case of adetention center, a warning can be sent to a detention facility officer107 in charge of the offender 105 corresponding to the deviation. Thesystem can enable one or more RFID readers 102 to perform one or morepre-programmed programmable events 220 (see FIG. 2), such assimultaneously or on a scheduled or non-scheduled basis. Theprogrammable events 220 can enable the RFID readers 102 and the systemto be flexible in implementing or at least partially automating a widerange of offender monitoring services, such as monitoring the movementof offenders 105 (note that “105” is used to refer to offendersgenerally). The programmable events can allow an RFID reader 102 to helpperform multiple tasks simultaneously.

One or more user defined monitoring rules 222 (see FIG. 2) can beassigned to a programmable event 220. User defined monitoring rules 222can include offender 105 movement restrictions (e.g., offender 105A isnot to be outside his cell at a certain time) or offender relationrestrictions (e.g., offenders 105A and 105B are not to be within acertain distance of each other). The monitoring rules 222 can include anoffender's housing assignment or times that an offender is to be inthere cell. Other user defined monitoring rules can include ensuring oneor more inmates arrive to a pre-defined destination within a predefinedamount of time, validating that inmates assigned to a housing unit arepresent (e.g., conducting a head count), or notifying system users thatan RFID reader 102 detected a transponder 104 when no transponder 104(note that “104” is used to refer to transponders generally) detectionwas expected or allowed.

The monitoring rules 222 can include rules defining an amount of timeallowed for travel from a point of origin to a destination or requiringone or more RFID readers 102 to read the transponder 104 of an offenderwhile the offender is en route to the destination. The RFID reader 102can be caused to scan for the transponder 104 within a window of timeafter the offender has left the point of origin. For example, the RFIDreader 102 can be caused to scan for the transponder 104 associated withthe traveling offender 105 for five minutes after the offender 105 hasleft the point of origin. In another example the RFID reader 102 can becaused to scan for the transponder 104 from between one minute after theoffender has left the point of origin to eleven minutes after theoffender 105 has left the point of origin.

The monitoring rules 222 can include a capacity limitation that definesa maximum number of offenders 105 that can be within a certain room orarea at a given time. If the capacity limitation is exceeded, an alertcan be communicated to appropriate personnel. The monitoring rules caninclude ensuring that offenders 105 en route to a common destination donot have a keep separate restriction.

User defined processes can be assigned to a programmable event 220. Userdefined processes can include, for example, that a web service cansearch for predefined restrictions that might preclude an inmate frombeing able to enter a certain room or area or that two or more inmatesare not allowed to associate with each other (e.g., be within the sameroom or area of the facility). The user-defined processes can validatethat a direction an inmate was detected walking is acceptable. This canbe accomplished using a radar module 103. The user-defined processes caninclude a user causing an RFID reader 102 to scan for a transponder 104in a specific location (e.g., a multi-purpose room, such as a rec room).

The user-defined processes can include a scheduled or non-scheduledoffender 105 movement to a destination. For example, a user can definethat an offender is to get medical attention and that the offender is totravel to the health care facility. The user-defined processes can becreated using a scheduling module 211 that can be a part of the webapplication 210 or a mobile application. The ability for a user toschedule offender movement can be integrated with an existing schedulingsolution.

The user can initiate an offender 105 movement using the web application210 or a mobile application, such as by using the scheduling module 211.The user can have an RFID reader 102 (e.g., a fixed RFID reader) scanthe transponder 104 associated with the offender 105. The user canspecify the destination of the offender 105 before or after thetransponder 104 was scanned. The system can then monitor the offender'sprogress to the destination (e.g., “progressive validation”), such as byverifying the transponder 104 associated with the offender 105 passeswithin range of one or more specific RFID readers 102. An RFID reader102 at or near the destination can help verify the presence of theoffender 105 by scanning for the associated transponder 104.

A monitoring rule can be defined that requires the transponder 104 of amoving offender 105 to be scanned by an RFID reader 102 within aspecified period of time. An alert can be created if the RFID reader 102does not detect the transponder 104 within the specified period of time.Progressive validation can include scanning for a transponder 104 thatis off the specified path. An alert can be created if the transponder104 is detected off the path. Progressive validation can also includedirectional detection and one or more monitoring rules regarding theallowed direction of the offender 105 through an RFID reader 102. Analert can be created if the direction of the offender 105 is not allowedby the monitoring rules 222.

Progressive validation can include validating that an offender 105 istraveling along a pre-defined path by detecting the transponder 104corresponding to the offender 105 at an RFID reader 102 at anintermediate location between the origin and the destination of theoffender. Progressive validation can be used in only selected movementsof offenders 105, such as movements to specified destinations or withina specific period of time, all offender 105 movements, all or specifiedmovements of a specific offender 105, a combination thereof, or othermovements. For example, progressive validation can be used for anoffender 105 with pre-defined security restrictions or related alerts,or an association with a specific monitoring rule or alert that wascreated. Progressive validation can include verifying that one or morestaff of the facility (e.g., a detention center officer 107) is near anoffender 105 before the offender 105 is permitted to begin the movement.Progressive validation can include verifying, such as by personnelresponsible for monitoring movement of the offender 105, that theoffender 105 is in transit or that the offender 105 is at thedestination of the movement.

Progressive validation can be performed by a user (e.g., a detentioncenter officer). Such validation can occur through a user verifying,such as by manually entering into the system, that the offender movementoccurred. Such manual validation can include entering a unique ID of theoffender 105 or transponder 104 associated with the offender 105. Theweb application can record data pertinent to location (e.g., apreprogrammed database code, a computer name through which data wasentered, an Internet Protocol (IP) address associated with the computer,or the like) with a progressive validation performed by a user.

Non-scheduled movement can include one or more offenders 105 that canhave the same or different destinations. An offender's destination maynot always be specified by a user before offender 105 movement hasbegun. For example, when it is discovered that two offenders 105A-105Bwho are not supposed to be associating with each other are in the samearea, the system can send an alert to move the offender 105 before thedestination of the offender is known. One or more specified RFID readers102 can be forced to scan for the transponder 104 of the offender 105and whichever RFID reader 102 detects the transponder 104 can date ortime stamp the read event and confirm the offender's presence at thelocation of the RFID reader 102.

A user can define an arrival time or a return time for scheduled ornon-scheduled movements. An arrival time can define a specified periodof time in which an offender 105 should authenticate their arrival byhaving a transponder 104 scanned by an RFID reader 102 at or near theirdestination, such as to not trigger an alert. A return time can define aspecified period of time within which an offender 105 shouldauthenticate their return to the point of origin by having a transponder104 scanned by an RFID reader 102 at or near their point of origin, suchas to not trigger an alert.

A user (e.g., a system administrator) can define or allow scheduled ornon-scheduled offender movement to not trigger an alert. This allowancecan be granted on a per movement, per offender 105, or per group ofoffenders basis. In such a configuration an offender 105 can be allowedto authenticate their arrival time or return time late withouttriggering an alert. In one or more embodiments, the allowance can begranted to an offender 105 that has few, no, or only certainrestrictions (e.g., monitoring rules associated with the offender 105)or offenders in good standing. A record of the late authentication canbe recorded even if no alert is created. The record can include the timethe offender 105 authenticated their arrival, or the time the offender105 was detected at the destination or point of origin. The record caninclude an indication of how late the offender was in authenticatingtheir arrival or return. The system can notify one or more specifiedusers in response to an offender 105 arriving at a destination. Thenotification (e.g., message) can include the date or time of arrival, aunique ID associated with the offender 105 or transponder 104, or otherinformation pertinent to the arrival of the offender 105.

If a transponder 104 becomes inoperable (e.g., because the transponder104 failed or the offender damaged it either intentionally orunintentionally or lost it) the arrival time or return time can bemanually entered into the system, such as through server 108. The recordassociated with such an authentication can include an indication thatthe authentication was done manually or the reason the authenticationwas done manually.

A user can predefine acceptable paths from a point of origin to adestination or for the return trip to the origin from the destination.The user can define that the transponder 104 associated with a movingoffender 105 be scanned by one or more RFID readers 102 while en route.The predefined paths and RFID readers 102 to scan the transponder 104 onthe path can be stored in the database 214. The acceptable travel pathscan be created at run-time, such as by using the web application 210.The paths can be saved into a library of predefined paths. The paths canbe accessed by users with sufficient privileges to allow them to createnew paths or modify existing paths. The disclosure regarding FIG. 3describes predefined acceptable paths.

A programmable event 220 can be associated with more than one RFIDreader 102. For example, in the example of doing a head count in asecure facility a programmable event 220 can trigger RFID readers102A-120D to determine the number of offenders in their cell, housingunit, or some other location, such as an infirmary or recreation yard.Associating a programmable event 220 with an RFID reader 102 can be doneautomatically, such as by a computer processor, or can be done manuallyby a user through an application configured to manage the configurationand implementation of an offender documentation system. The server 108Aor 108B can instruct or poll the RFID readers 102A-102F for collecteddata or the RFID readers 102A-F can be programmed to send the collecteddata to the server 108A-108B or the service 216. The data can be sent assoon as the data is collected, on a pre-determined schedule, or acombination thereof.

One or more of the RFID readers 102A-102F can be configured toconstantly or intermittently monitor for a nearby transponder 104 (e.g.,a passing transponder 104 or a transponder 104 that has moved withinrange of the RFID reader 104). Such RFID readers 102 can be helpful inmonitoring areas where transponders 104 are not expected to be or inmonitoring transit points to monitor the progress of offenders 105 intransit. When one of these RFID readers 102 detects the presence of atransponder 104, an alarm or message can be sent to the properpersonnel, such as through the server 108 or the network 213. Themessage or alert can be a text, or other content, message to a mobiledevice, an email (e.g., including an attachment), or other notification.

The data sent from the RFID readers 102A-102F to the server 108 can beencrypted. The data from the RFID reader 102 can be sent to a server 108that is running middleware 224 (e.g., software that provides services toa software application beyond those available from an operating systemor an application that logically and physically runs between a senderand a receiver).

In one or more embodiments, rather than using middleware 224 or callingone or more services 216 (e.g., services provided over the internet orthrough the network 213 with or without the internet), the RFID reader102 can include one or more services, which may be in the form of anapplication programming interface (API), database connectivity client,or other logical element to perform the functions of the middleware 224or the service 216. An example of an RFID reader 102 that can be used toperform the functions of the middleware or the service 216 is the FX7400RFID reader from Motorola, Inc. of Schaumburg, Ill.

The RFID reader 102E can include a screen configured to displayinformation related to scanning a transponder 104. The RFID reader 102Ecan be configured to display, such as on display 106 a schedule to auser indicating when or where RFID reader 102E scans are to occur. Theschedule can be retrieved from the database 214 or the scheduling module211.

The radar module 103 can be situated near an RFID reader 102F so as todetect a number of offenders 105 passing thereby or to detect adirection an offender 105 is traveling. The radar module 103 can beincorporated into an RFID reader 102. Including the radar module 103 inthe system can help a system determine the number of offenders 105, thedirection each offender 105 is traveling, or the like of a transponder104 within range of the radar module 103. Such information can berelayed to the server 108. The information sent to the server 108 can beaccompanied by an identification of the transponder 104 and a nearbyRFID reader 102.

The RFID reader 102 can include one or more radar modules 103electrically or mechanically coupled thereto. An example of such a radardetector or people counter is the OBID® i-scan® from Feig Electronic ofGermany. Such radar detectors are operable to detect persons movingtowards and going away from the radar or the associated RFID reader 102.The direction can be determined by transmitting a signal, monitoring forsignal reflections, and detecting how much time it takes for thereflection to be detected by the radar detector.

A monitoring rule 222 can include that the service 216 is to validatethe direction the offender 105 was detected moving. When the service 216determines that the offender 105 was moving in an unacceptabledirection, a system alert can be triggered and the system can make arecord of the violation.

The transponder 104 can transmit a unique identifying signal that isrecognizable by an RFID reader 102. In one or more embodiments, thetransponder 104 can emit the identifying signal in response to a signalsent from the RFID reader 102. The transponder 104 can be incorporatedinto a bracelet, a chip configured to be embedded in clothing, animplantable device, an identification card, or may take some other formthat allows the transponder 104 to travel with an offender 105 (e.g.,inmate) or an item of interest. The transponder 104 can be assigned toan individual offender 105 or an entity at the secure facility otherthan an offender 105, such as a detention center officer 107. In asystem that includes a transponder 104 associated with an entity at thesecure facility, the system can detect when the entity (e.g., adetention center officer 107), is near an offender 105.

The server 108 can be configured to run a web application 210 ormiddleware 224 configured to implement or manage automatic offenderdocumentation. The server 108 can receive data from the RFID readers102A-102F. The data received can include a unique identification (ID)key that identifies the RFID reader 102A-102F that sent the data. Theserver 108 can look up the RFID reader ID and correlate a specific timeor location with the RFID reader 102A-102F. The server 108 can send thetime, location, and RFID ID data to another server 108B, such as at adata center 218.

The server 108 can be part of a Local Area Network (LAN), or it can behosted remotely. The middleware 224 that can be accessible through theserver 108 can either be hosted locally (e.g., through a LAN) orremotely. The middleware 224 can send data received or modified by theserver 108 or middleware 224 to a service 216.

FIG. 2 illustrates an example of a networked system 200 for automatedoffender documentation. The networked system can include the RFIDreaders 102A-102B the server 108A, a web application 210, or a firewall212A. The RFID readers can be coupled to the server 108A such that datacan be sent to the server 108A from the RFID reader 102A-102B and datacan be sent to the RFID reader 102A-102B from the server 108A. Theserver 108A can be coupled to the web application 210, such as to hostthe web application 210. The server 108A can be coupled to the firewall212A so data sent from and received at the system 100 can be protectionscanned, encrypted, or decrypted.

While the server 108B, service 216, and the database 214 are depicted asindividual units, they may be implemented on one or more servers. Forexample, the server 108B, service 216, and database may all beimplemented on the same server, or each may be implemented on its ownserver.

The web application 210 can render web pages that can provide thefunctionality of the service 216 to a user. The web application can behosted locally, such as on server 108A, or remotely, such as on server108B.

The networked system can include the system 100 coupled to the datacenter 218, such as through a network 213 (e.g., the internet). Such aconfiguration can allow the data storage for and analysis of monitoringRFID reader 102 and transponder 104 interactions to be off site. Thedata center 218 can include a firewall 212B coupled to a server 108B anda service 216, such that the firewall 212B can help to ensure that thedata sent to the server 108B and the service 216 will not harm theserver 108B or service 216. The server 108B can be coupled to a database214, such that the database 214 can provide data to the server andreceive data from the server 108B. The server 108B can be coupled to theservice 216, such that the service 216 can provide functionality relatedto automated offender documentation to the server 108B. The datareceived at the server 108B can be used in rendering web pages to users.The database 214 can be coupled to the service 216 to provide data tothe service 216 and to receive and store the results of operationsperformed by the service 216.

The firewalls 212A-212B can scan incoming and outgoing data for malwareto help reduce the chances of a malicious attack on the system 200. Thefirewall 212A can encrypt data that is outgoing or decrypt data that isincoming. The encryption or decryption can be accomplished using aseparate encryption or decryption module and can be incorporated atdifferent places in the system such as on an RFID reader 102, so as toallow encrypted data sent to be sent to the server 108B.

The service 216 can be deployed locally on the server 108B or hostedremotely. The service 216 can retrieve programmable events 220 currentlyassigned to an RFID reader 102. The programmable events 220 can bestored in the database 214, on the server 108A-108B, or on the service216. The service 216 can run processes associated with a programmableevent 220. For example, the service 216 can analyze, organize, or formatcollected data. The analyzed, organized, or collected data can be sentto the database 214 for retention. The analysis can include comparingthe data to monitoring rules 222 associated with a programmable event220. Such comparisons can monitor compliance and detect violations ofthe monitoring rules 222 and an alarm, alert, or message can be sent tothe proper personnel when a monitoring rule 222 has been violated.

The service 216 can correlate collected data. A correlation of data canhelp the service 216 detect a violation of a monitoring rule 222. Acorrelation can be performed at an individual offender level, a blocklevel, an entire building (e.g., secure facility, such as a detentioncenter, mental health facility, or the like) level, or other level. Forexample, the service 216 can correlate all data associated with the sameoffender or a cellblock and compare that data to the monitoring rules222 relating to the offender or the cellblock to determine if theoffenders 105 comply with the monitoring rule or a violation hasoccurred. The service 216 can compare one offender's data to anotheroffender's data to determine if a monitoring rule 222 violation hasoccurred. Such comparisons can be useful when a monitoring rule 222states that two or more offenders are to be kept separately, not contacteach other, or otherwise not associate with each other. The service 2126can be hosted locally (as shown) or can be hosted on the network 213(e.g., cloud).

The service 216 can receive and process data from the middleware 224.The processing can include authenticating a customer name.Authenticating a customer name can be done by verifying a customer'sport number in examples where a customer has been assigned a unique portnumber. Authenticating can also include verifying RFID reader 102A-102FID information and transponder 104A-D ID information received isconsistent and assigned to that customer. A user (e.g., an end user) canautomate the running of programmable events 220 through scheduling themthrough the service 216. A user can manually trigger a programmableevent 220 to for the service 216 to execute. The user can customize theoperations performed by the service 216 in running a programmable event220, such as through the server 108A-108B or web application. Theservice 216 can compare data received to monitoring rules 222 anddetermine if a monitoring has been violated. The service can initiate analert process in response to determining that a rule has been violated.

The database 214 can store monitoring rules 222 therein. The monitoringrules 222 can define the relationship between or validate theperformance expectations between a programmable event 220 and atransponder 104. This can include cross-referencing other monitoringrules 222 (e.g., restrictions or requirements) associated with a giventransponder 104. For example, an offender 105 could be restricted frommoving or from entering a specific room or area of a building. The ruleor restriction could be for punitive reasons, health concerns, safetyconcerns, or the like. For example, a monitoring rule 222 can indicatethat one or more inmates are to be kept separate at all times. Themonitoring rule 222 can have an associated duration in which themonitoring is valid and is to be referenced by the service 216. One ormore monitoring rules 222 can be associated with a specific offendersuch that when the offender is no longer in the building, the monitoringrule 222 is no longer referenced by the service 216.

The service 216 can analyze the data received from the RFID readers102A-102F and compare the received data to relevant monitoring rules 222to determine if an alert or message should be sent to the relevantpersonnel. If no violation is detected the service 216 can initiate asequence of operations (e.g., a pre-programmed sequence of operations,processes, or events) to complete. For example, the service 216 can lookfor a violation of a user defined process rule (e.g., an inmate istraveling the wrong direction or there are too many inmates in aspecific area). The service 216 can then search for violations ofmonitoring rules (e.g., a first inmate cannot be in a specific areabecause a second inmate is already present in the area, an inmate is notallowed to be in the rec area, or other monitoring rule violation). Theservice 216 can then continue to perform another process (e.g., a userdefined process), such as documenting the locations of inmates that arewithin the range of an RFID reader 102. Future data received can beanalyzed (e.g., compared to monitoring rules 222) in real-time todetermine if an alert or message is to be sent. When the analysis iscomplete, the service 216 can record that the analysis was completed inthe database 214.

In the case of an Internet failure (e.g., the Internet is temporarilyunavailable) the middleware 224 can be configured to store received datain a local memory. When Internet connectivity is restored, the receiveddata can be sent to the service 216. Such a configuration can be helpfulin embodiments that include Software as a Service (SaaS) or a remotelyhosted server. The middleware 224 can be configured to determine if amonitoring rule 222 has been violated, such as when the Internetconnection to the service has failed. In one or more embodiments, themiddleware 224 includes a subset of all the monitoring rules 222 for aspecific system. These monitoring rules 222 can be the most importantrules (e.g., the rules that the user does not want violated). In one ormore embodiments, the service 216 can determine if a monitoring rule 222has been violated after it has received the relevant data.

The middleware 224 can reside on the server 108A or 108B, locally orremotely, respectively. In one or more embodiments, the middleware 224can be hosted in a network 213 (e.g., cloud) server. Such animplementation can provide automated offender documentation to a userthrough a Software as a Service (SaaS) configuration. The middleware 224can provide communication between the RFID readers 102A-102F and thedata center 218. The middleware 224 can be configured to encrypt data itreceives from the RFID readers 102A-F and send the encrypted data to theservice 216, server 108B, or the database 214.

The database 214 can store data from the RFID readers 102A-102B, theservice 216, the web application 210, or the server 108A-B.

FIG. 3 illustrates a building 300 configured to monitor the movement ofoffenders 105 therein. The building can include a plurality of RFIDreaders 102A-102M or a plurality of radar modules 103A-103E. Auser-defined process can indicate that an offender 105 is to travel apath from the “origin” to the “destination”. One or more monitoringrules 222 associated with the user-defined process can define a paththat the offender must travel to get to the destination. In this examplethe path is from the “origin” go past RFID reader 102K, turn left atRFID reader 102L, go past RFID reader 102M, and proceed to thedestination.

In this example if any of RFID readers 102B-102F or 102H-102J detects atransponder 104 associated with the offender 105 during the time of thetravel, and then an alert can be sent to the appropriate personnel.Similarly if radar modules 103A or 103D detect the transponder 104associated with the offender 105 traveling in a direction inconsistentwith the pre-defined path, an alert can be sent to the appropriatepersonnel.

One or more monitoring rules associated with the user-defined processcan stipulate that the RFID readers 102K, 102M, and 102G are to detectthe transponder 104 associated with the offender 105 within a specifiedperiod of time. If any one of the RFID readers 102K, 102M, and 102G doesnot detect transponder 104 within the specified period of time, then analert can be sent to the appropriate personnel. The radar module 103Aand the RFID reader 102K can, in combination, determine the number oftransponders passing by and the IDs of the transponders. This data canbe used to determine if personnel (e.g., personnel defined by theuser-defined process required to accompany the offender(s) in transit)are accompanying the offender(s) to the destination. This data can alsobe used to determine if the correct number of offenders 105 is intransit. If not, then an alert can be sent to the proper personnel.

FIG. 4 illustrates a user interface 400, according to an exampleembodiment. User interface 106 can be substantially similar to userinterface 400. The user interface 400 can include information such asthe names 402 or unique IDs of offender 105 in a secure facility. Theuser interface 400 can show a location 404 that a transponder 104associated with an offender 105 was last detected and the date/time 406of the last detection. The user interface 400 can show whether anoffender is in transit, such as by showing where the offender 105 istraveling from 408 and where the offender 105 is scheduled to travel to410. Other information pertinent to the monitoring of offender movementcan be displayed on the user interface 400.

Current or historical movement data can be graphically represented on anelectronic map of the facility, such as the map of the facility shown inFIG. 3. Information pertinent to a movement can be overlaid at positionscorresponding to where the information was collected.

FIG. 5 illustrates a flow diagram of a technique 500 for monitoringoffender movement, according to an example embodiment. At 502, data canbe received from one or more RFID readers 102 and one or more radarmodules 103. The data received can indicate a time an RFID reader 102detected a transponder 104 associated with an offender 105, a uniqueidentifier associated with the transponder 104, a unique identifierassociated with the RFID reader 102, or an indication of a direction theoffender was traveling.

At 504, the data can be sent to a web service 216. At 506, an alert thata monitoring rule 222 was violated can be received from the web service216. The monitoring rule 222 can relate to the offender 105. At 508, thealert can be sent to a device (e.g., a mobile device) associated with anentity responsible for the offender 105.

FIG. 6 is a block diagram of a computing device, according to an exampleembodiment. In one embodiment, multiple such computer systems areutilized in a distributed network to implement multiple components in atransaction-based environment. An object-oriented, service-oriented, orother architecture may be used to implement such functions andcommunicate between the multiple systems and components. An example of acomputing device in the form of a computer 610 may include a processingunit 602, memory 604, removable storage 612, and non-removable storage614. Memory 604 may include volatile memory 606 and non-volatile memory608. Computer 610 may include—or have access to a computing environmentthat includes—a variety of computer-readable media, such as volatilememory 606 and non-volatile memory 608, removable storage 612 andnon-removable storage 614. Computer storage includes random accessmemory (RAM), read only memory (ROM), erasable programmable read-onlymemory (EPROM) & electrically erasable programmable read-only memory(EEPROM), flash memory or other memory technologies, compact discread-only memory (CD ROM), Digital Versatile Disks (DVD) or otheroptical disk storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium capableof storing computer-readable instructions. Computer 610 may include orhave access to a computing environment that includes input 616, output618, and a communication connection 620. The computer may operate in anetworked environment using a communication connection to connect to oneor more remote computers, such as database servers. The remote computermay include a personal computer (PC), server, router, network PC, a peerdevice or other common network node, or the like. The communicationconnection may include a Local Area Network (LAN), a Wide Area Network(WAN) or other networks.

Computer-readable instructions stored on a computer-readable medium areexecutable by the processing unit 602 of the computer 610. A hard drive,CD-ROM, and RAM are some examples of articles including a non-transitorycomputer-readable medium. For example, a computer program 625 capable ofproviding a generic technique to perform access control check for dataaccess and/or for doing an operation on one of the servers in acomponent object model (COM) based system according to the teachings ofthe present invention may be included on a CD-ROM and loaded from theCD-ROM to a hard drive. The computer-readable instructions allowcomputer 610 to provide generic access controls in a COM based computernetwork system having multiple users and servers.

The functions or algorithms described herein are implemented inhardware, software, or a combination of software and hardware in someembodiments. The software comprises computer executable instructionsstored on computer readable media such as memory or other type ofstorage devices. Further, described functions may correspond to modules,which may be software, hardware, firmware, or any combination thereof.Multiple functions are performed in one or more modules as desired, andthe embodiments described are merely embodiments. The software isexecuted on a digital signal processor, ASIC, microprocessor, or othertype of processor operating on a system, such as a personal computer,server, a router, or other device capable of processing data includingnetwork interconnection devices.

Some embodiments implement the functions in two or more specificinterconnected hardware modules or devices with related control and datasignals communicated between and through the modules, or as portions ofan application-specific integrated circuit. Thus, the exemplary processflows are applicable to software, firmware, and hardwareimplementations.

Systems and methods of the present disclosure may be implemented on amobile device as a mobile application, web-based application, on adesktop computer as a computer application, or a combination thereof. Amobile application may operate on a Smartphone, tablet computer,portable digital assistant (PDA), ruggedized mobile computer, or othermobile device. The mobile device may be connected to the Internet ornetwork via Wi-Fi, Wide Area Network (WAN), cellular connection, WiMax,or any other type of wired or wireless method of networking connection.In some embodiments, a web-based application may be delivered as asoftware-as-a-service (SaaS) package (e.g. cloud-based embodiments)accessible via a device app, a web browser application, or othersuitable application, depending on the particular embodiment.

In this document, the terms “a” or “an” are used, as is common in patentdocuments, to include one or more than one, independent of any otherinstances or usages of “at least one” or “one or more.” In thisdocument, the term “or” is used to refer to a nonexclusive or, such that“A or B” includes “A but not B,” “B but not A,” and “A and B,” unlessotherwise indicated. In this document, the terms “including” and “inwhich” are used as the plain-English equivalents of the respective terms“comprising” and “wherein.” Also, in the following claims, the terms“including” and “comprising” are open-ended, that is, a system, device,article, composition, formulation, or process that includes elements inaddition to those listed after such a term in a claim are still deemedto fall within the scope of that claim. Moreover, in the followingclaims, the terms “first,” “second,” and “third,” etc. are used merelyas labels, and are not intended to impose numerical requirements ontheir objects.

Although an embodiment has been described with reference to specificexample embodiments, it will be evident that various modifications andchanges may be made to these embodiments without departing from thebroader spirit and scope of the invention. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense. The accompanying drawings that form a parthereof, show by way of illustration, and not of limitation, specificembodiments in which the subject matter may be practiced. Theembodiments illustrated are described in sufficient detail to enablethose skilled in the art to practice the teachings disclosed herein.Other embodiments may be utilized and derived therefrom, such thatstructural and logical substitutions and changes may be made withoutdeparting from the scope of this disclosure. This Detailed Description,therefore, is not to be taken in a limiting sense, and the scope ofvarious embodiments is defined only by the appended claims, along withthe full range of equivalents to which such claims are entitled.

What is claimed is:
 1. A system comprising: a transponder associatedwith an offender; a radar module configured to determine a direction ofa moving object passing within range of the radar module; a radiofrequency identification reader situated near the radar module andconfigured to transmit an interrogating signal to the transponder andreceive an identifying signal in response to the transponder receivingthe interrogating signal; and a server configured to receive data fromthe radio frequency identification reader and the radar module through anetwork, transmit the received data to a web service through thenetwork, and receive an alert from the web service that a monitoringrule of a plurality of monitoring rules associated with the offender wasviolated.
 2. The system of claim 1, wherein the radio frequencyidentification reader is a first radio frequency identification readerpositioned within range of an origin of a path that the offender is totravel, wherein the plurality of monitoring rules include a firstmonitoring rule defining a direction that the offender is permitted totravel past the first radio frequency identification reader; and thesystem further comprises a second radio identification reader positionedwithin range of a destination of the path.
 3. The system of claim 2,wherein a second monitoring rule of the plurality of monitoring rulesindicates that the transponder is to be detected by the second radiofrequency identification reader within a first specified period of time.4. The system of claim 3, further comprising a third radio frequencyidentification reader situated within range of the path between thefirst radio frequency identification reader and the second radiofrequency identification reader.
 5. The system of claim 4, wherein athird monitoring rule of the plurality of monitoring rules indicatesthat the transponder is to be detected by the third radio frequencyidentification reader within a second specified period of time differentfrom the first specified period of time.
 6. The system of claim 5,wherein the system further comprises a fourth radio frequencyidentification reader situated such that when the transponder is alongthe path, the transponder is not within range of the fourth radiofrequency identification reader.
 7. The system of claim 6, wherein afourth monitoring rule of the plurality of monitoring rules indicatesthat the fourth radio frequency identification reader should not detectthe transponder while the offender is traveling.
 8. A method comprising:receiving data from a radio frequency identification reader and a radarmodule, the data indicating a time the radio frequency identificationreader detected a transponder associated with an offender, the dataincluding a first unique identifier associated with the transponder anda second unique identifier associated with the radio frequencyidentification reader, and the data including an indication of adirection the offender was traveling; sending the data to a web serviceand receiving, from the web service, an alert that a monitoring rulecorresponding to the offender has been violated by the offender; andsending the alert to a mobile device associated with an entityresponsible for the offender.
 9. The method of claim 8, wherein theradio frequency identification reader is a first radio frequencyidentification reader situated within range of an origin of a path, andwherein receiving data includes receiving data from a second radiofrequency identification reader situated within range of a destinationof the path.
 10. The method of claim 9, wherein sending the alertincludes sending an indication that a monitoring rule indicating thatthe transponder is to be scanned by the second radio frequencyidentification reader within a first specified period of time isviolated.
 11. The method of claim 9, wherein receiving data includesreceiving data from a third radio frequency identification readersituated along the path between the first radio frequency identificationreader and the second radio frequency identification reader.
 12. Themethod of claim 11, wherein sending the alert includes sending anindication that a monitoring rule indicating that the transponder is tobe scanned by the third radio frequency identification reader within asecond specified period of time is violated.
 13. The method of claim 11,wherein receiving data includes receiving data from a fourth radiofrequency identification reader situated such that it is not withinrange of the path.
 14. The method of claim 13, wherein sending the alertincludes sending an indication that a monitoring rule indicating thatthe transponder is not to be scanned by the fourth radio frequencyidentification reader is violated.
 15. A system comprising: atransponder associated with an offender; a first radio frequencyidentification reader situated within range of an origin of a predefinedpath an offender is to travel; a second radio frequency identificationreader situated within range of a destination of the path; and a serverconfigured to receive data from the first and second radio frequencyidentification readers through a network, transmit the received data toa web service through the network, and receive, from the web service, anindication that a monitoring rule relating to the offender was violatedby the second radio frequency identification reader not detecting thetransponder within a first specified period of time.
 16. The system ofclaim 15, further comprising a third radio frequency identificationreader situated along the path between the first radio frequencyidentification reader and the second radio frequency identificationreader.
 17. The system of claim 16, wherein the monitoring ruleindicates that the transponder is to be detected by the third radiofrequency identification reader within a second specified period of timedifferent from the first specified period of time.
 18. The system ofclaim 17, wherein the system further comprises a fourth radio frequencyidentification reader situated such that when the transponder is alongthe path, the transponder is not within range of the fourth radiofrequency identification reader.
 19. The system of claim 18, wherein themonitoring rule indicates that the alert is to be transmitted inresponse to the fourth radio frequency identification reader detectingthe transponder while the offender is traveling.
 20. The system of claim19, wherein the monitoring rule indicates that no alert is to be sent inresponse to detecting a violation of the monitoring rule.