System and method for remote monitoring of released individual

ABSTRACT

A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.

BACKGROUND

Field

The disclosure relates to systems and methods for tethering a devicewith an individual.

Background

After incarceration, an individual is often released under a trialstatus. Under this trial status, the released individual is subject tonumerous restrictions and rules. As part of their release, acommunication device may be assigned to the individual. Thecommunication device is used for a variety of different reasons, such asmonitoring the individual's location, receiving mandatory check-ins fromthe individual, etc. Conventionally, the device was issued by thereleasing correctional institution, and in order to carry out thecheck-ins, the released individual would be charged for a wireless planon a wireless carrier.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a perspective view of an exemplary tetheringenvironment according to an embodiment of the disclosure.

FIG. 2 illustrates a block diagram of an exemplary tethering systemaccording to an embodiment of the disclosure.

FIG. 3A illustrates a portion of the method of FIG. 3 that is performedby a personal wireless communication device according to an embodimentof the disclosure.

FIG. 3B illustrates a portion of the method of FIG. 3 that is performedby a fixed device according to an embodiment of the disclosure.

FIG. 4A illustrates a block diagram of an exemplary power transfersystem of the exemplary tethering system according to an embodiment ofthe disclosure.

FIG. 4B illustrates a block diagram of an exemplary power transfersystem of the exemplary tethering system according to an embodiment ofthe disclosure.

FIG. 4C illustrates a block diagram of an exemplary power transfersystem of the exemplary tethering system according to an embodiment ofthe disclosure.

FIG. 5 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” and thelike, indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the invention. Rather, the scope ofthe invention is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, and the like), and others. Further, firmware, software,routines, instructions may be described herein as performing certainactions. However, it should be appreciated that such descriptions aremerely for convenience and that such actions in fact result fromcomputing devices, processors, controllers, or other devices executingthe firmware, software, routines, instructions, and the like. Further,any of the implementation variations may be carried out by a generalpurpose computer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, orhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the invention that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

As discussed above, when an inmate is released from custody (e.g.,prison), that person must often consent to certain monitoring and/orcheck-in requirements. As part of that agreement, the releasedindividual may be required to stay within certain geographicallocations, call in to a case worker periodically, confirm theirlocation, etc. Conventionally, the released individual would beoutfitted with a fixed device that would be affixed to their person,such as around their wrist or ankle. The fixed device would have its ownpower source, as well as its own long-range communication capabilities.More recently, in order to circumvent the requirements of having a veryspecialized device, facilities have begun to issue released individualswith a specially configured wireless communication device, such as acellular telephone or tablet device. The released individual would beable to carry out their check-in and location certification requirementsvia the assigned device.

However, because each of the conventional solutions must be capable ofcommunicating over the cellular network, each requires its own wirelesscarrier plan. This adds significant cost to a released individual who isoften very low on liquid finances. Further, because these devices arespecialized they often cannot replace the individual's personal device.Thus, the released individual must pay for and carry two wirelessdevices. This is not a financially sound solution for arecently-released individual.

Therefore, there is a need for a monitoring solution that does notrequire a separate wireless carrier service plan.

Monitoring Environment

FIG. 1 illustrates a perspective view of an exemplary tetheringenvironment 100 according to an embodiment of the disclosure. In theenvironment, the released individual 110 is outfitted with a fixeddevice 120 and his own personal wireless communication device 130.Unlike conventional systems, the personal wireless communication device130 is not issued by the facility, government, or other monitoringagency, but rather is purchased and maintained by the inmate. As such,the personal wireless communication device 130 functions as the releasedindividual's device for personal use.

The fixed device 120 is affixed to the user in any number of ways. Thefixed device 120 can be an ankle or wrist bracelet, which locks inplace. Alternatively, the fixed device 120 may be implanted underneaththe skin. The fixed device 120 is locked onto the released individual'sperson so that it cannot be easily removed without significant effort.Form factors already exist for fixed devices, and are generallyacceptable for the present application.

In operation, the personal wireless communication device 130 isconfigured with software to carry out the check-in procedures. Throughthat software, the personal wireless communication device 130 carriesout the functions associated therewith as described herein. The personalwireless communication device 130 monitors one or more conditions, suchas the passage of time, the location, etc. When one of the conditions issatisfied, the personal wireless communication device 130 issues anotification to the released individual. In an embodiment, thenotification is a textual notification, and is accompanied by anaudible, vibrating, or other alert.

In response to the alert and the notification, the released individualis provided with an opportunity to transmit the required check-ininformation. In an embodiment, the released individual must perform thecheck-in requirement within a predetermined time. After thepredetermined time has elapsed without a response, the personal wirelesscommunication device 130 communicates a “Check-In Failed” signal to thecheck-in system 180.

Alternatively, in response to the alert and notification, the releasedindividual 110 moves the personal wireless communication device 130within close proximity of the fixed device 120. The proximity causes thefixed device to activate and respond with stored encoded identity data.The personal wireless communication device 130 receives the identitydata, confirms that it is associated with the released individual, andthen transmits the check-in signal to the check-in system 180.

As shown in FIG. 1, the check-in system 180 includes the check-in server150 and an administrator device 170 connected via a network 160. Thecheck-in signals and check-in failure signals sent from the personalwireless communication device 130 are received at the check-in serverand processed therein. The processing may include storing the signals,generating reports, statistics, etc., and generating a notificationsignal for forwarding the check-in information to the administratordevice 170 via the network 160. In this manner, a case manager or otheradministrator may oversee the check-ins of the released individual 110.

FIG. 2 illustrates a block diagram of an exemplary tethering system 200according to an embodiment of the disclosure. The tethering system 200includes the personal wireless communication device 201 and the fixeddevice 202.

The personal wireless communication device 201 includes a processor 210,Location 220, Long-distance communication 230, short-distancecommunication 250, and ID 240, and may represent an exemplary embodimentof the personal wireless communication device 130.

In the personal wireless communication device 201, the location 220 isconfigured for determining a location of the personal wirelesscommunication device 201. In an embodiment, the location 220 is a GNSSreceiver that receives GNSS signals from one or more GNSS satellites.Using conventional GPS location determination methods, the location 220determines a location of the device 201. In other embodiments, thelocation 220 may carry out triangulation methods based on signalsreceived from a plurality of wireless base stations or other accesspoints, and/or includes force detection mechanisms (e.g., anaccelerometer) for detecting spatial motion of the personal wirelesscommunication device 201.

Long-distance communication 230 includes a radio or other wave generatorfor transmitting modulating data signals over an air interface. Invarious embodiments, the long-distance communication 230 is configuredto communicate over any of several different wireless communicationstandards, including 2G, 3G, LTE, etc.

Short-distance communication 250 is designed for communicating with anearby fixed device, and thus does not require the same powerconsumption as the long-distance communication 230. Thus, theshort-distance communication 250 is any device and/or circuit capable ofwirelessly transmitting over short distances, including Bluetooth,Infrared, Near-Field Communication. In another embodiment, theshort-distance communication 250 is a wired communication port designedto communicate using USB or Internet protocols.

The ID 240 includes one or more memory banks for storing the ID of thereleased individual. This ID is the same as an ID stored on the fixeddevice 202, as will be discussed in further detail below. In anembodiment, the ID is stored encrypted. Processor 210 coordinates thefunctionality amongst the other circuits, and facilitates thecommunication and check-in functionality. The details of the processorwill be described below with respect to the system operation.

The fixed device 202 requires much simpler construction than thepersonal wireless communication device 201, as it does not require largeamounts of processing power or long-distance communication capabilities.Thus, the fixed device 202 includes a short-distance communicator 260,an ID 270, and a power source/power extraction 280, and may represent anexemplary embodiment of the fixed device 120.

The short-distance communicator has a similar construction to that ofshort-distance communication 230, and is configured for communicatingusing any short-range communication standard, such as Bluetooth,Infrared, or Near-Field communication. In an embodiment, theshort-distance communicator 260 is a wired port connection thatcommunicates over USB or Internet Protocol. The ID 270 includes one ormore memory banks that store the unique ID of the inmate. In anembodiment, the ID is stored encrypted. In this embodiment, either theID 270 or a separate decryptor (not shown) includes circuitry forcarrying out decryption of the ID before transmission, as describedbelow.

The fixed device 202 also includes a power source 280. In an embodiment,the power source 280 is configured to extract power from the personalwireless communication device 201 through the interaction therewith. Forexample, the power source 280 can be configured to extract power fromNear-Field communication modulation. When the short-distancecommunications 250 and 260 are configured to communicate using NFC(Near-Field Communication), then the power source 280 can extract thepower from the exchanged signals as part of that communication.Alternatively, if the short-distance communications 250 and 260 areconfigured to communicate using a different short-range communicationstandard, then the power source 280 may be configured to sync with apower transfer coil of the personal wireless communication device 201for purposes of performing independent power extraction using NFC.

In other embodiments, the fixed device 202 can be configured as apassive radio frequency identification tag. In this embodiment, thepower source 280 receives power from the personal wireless communicationdevice 201, which has RFID capabilities. The fixed device 201 is“energized” by the personal wireless communication device 201 in orderto provide the requested information. In another embodiment, the powersource 280 receives power directly from the personal wirelesscommunication device 201 over a wired connection. Such power can betransferred using any number of available standards, including USB. Instill another embodiment, the power source 280 is self-powering, such asby taking the form of a battery, kinetically charged capacitor, etc.When configured with a battery, the battery can be either replaceable orrechargeable. Additionally, the battery can be replaceable and/orchargeable. When chargeable, the battery is able to be charged via anyof the power transfer options described herein.

In operation, the processor 210 of the personal wireless communicationdevice 210 monitors one or more conditions, such as time, location, etc.In an embodiment, the personal wireless communication device 201 is alsocapable of receiving a check-in instruction from an external device,such as the administrator device 170. Such instruction is received viathe long-distance communication 230, and functions as another condition.Upon a condition being satisfied, the processor causes a check-innotification to be provided to the user. As discussed above, thenotification is displayed and/or audible. The processor 210 then startsa countdown timer within which the user must perform the check-inprocedure. The countdown timer should be long enough to allowcompliance, but short enough to prevent fraudulent behavior. In anembodiment, the user is given two minutes to respond.

During the allotted time period, the user of the personal wirelesscommunication device 201 moves the device 201 within close proximity ofthe fixed device 202. In an embodiment, the user presses a button on thepersonal wireless communication device in order to initiate the check-inprocedure once the device 201 has been moved near the fixed device 202.The processor 210 receives the initiation instruction and causes theshort-distance communication 250 to transmit the request signal to thefixed device. The request signal may take a variety of forms dependingon the communication standard being employed.

At the fixed device 202, the power source 280 provides power to theother components in any of the manners described hereinabove. Theshort-distance communicator receives the request signal from thepersonal wireless communication device 201. In response to the requestsignal, the short-distance communicator retrieves the releasedindividual's unique ID 270 from the ID memory 270, and then transmitsthe retrieved information back to the personal wireless communicationdevice 201 via the short-distance communicator 260.

In an embodiment, the ID is transmitted in encrypted form to bedecrypted at the personal wireless communication device 201. Thisfurther marries the fixed device 202 to the personal wirelesscommunication device 201.

The personal wireless communication device 201 receives the ID and, ifnecessary, decrypts the ID. The processor 210 then retrieves the IDstored in the local memory 240, and compares the stored ID with the IDreceived from the fixed device 202. If the IDs match, then the check-inprocess has been successful. As a result, the processor 210 generates acheck-in signal and causes the long-distance communication 230 totransmit the check-in signal to the check-in server 150. In anembodiment, the check-in signal includes additional information forlogging purposes, such as time of check-in, location, duration, etc.

On the other hand, if the IDs do not match, or if no successful responseis received within the countdown timer, the processor 210 determinesthat check-in has failed. The processor 210 then generates a Check-InFail message, and causes the long-distance communication 230 to transmitthe message to the check-in server 150.

The check-in server 150, upon receiving the check-in signal and/or theCheck-In Fail message, notifies the administrator device 170 of theevent via the network 160.

Power Transfer

As discussed above, in certain embodiments, the fixed device 202 mayreceive power in a variety of different ways. FIGS. 4A-4C depict blockdiagrams of different power configurations of the fixed device 202.

As shown in FIG. 4A, the personal wireless communication device 201 andthe fixed device 202 communicate via NFC. Thus, each includes NFCtransceivers 250/260, respectively. In this configuration, the powersource 280 of the fixed device 202 is a power extractor 280 thatextracts power from the near-field communication signals.

In an alternative embodiment, shown in FIG. 4B, the power source 280 ofthe fixed device is a wired electrical port 295. The wired port 295 ofthe fixed device 202 connects to a similar port 290 at the personalwireless communication device 201 via a wire connection 299. This wiredconnection can operate under any available wired communication and/orpower transfer standard, such as USB. The port 295 receives power viathe wired connection. In an embodiment, data may also be transferredover the connection, which may render the short-range communicators250/260 unnecessary.

In another embodiment, shown in FIG. 4C, the fixed device 202 issupplied with a simple power source, such as a battery,kinetically-charged capacitor, or other power source. In thisembodiment, no modifications are needed to either of the personalwireless communication device 201 or the fixed device 202.

Method of Implementation

FIGS. 3A and 3B illustrate a flowchart diagram of an exemplary tetheringmethod 300 according to an embodiment of the disclosure. The method ofFIGS. 3A and 3B will be described with respect to the elements of FIGS.1 and 2, where necessary. For discussion purposes, the method of FIGS.3A and 3B is broken into FIG. 3A (left side) that is performed by thepersonal wireless communication device 201, and FIG. 3B (right side)that is performed by the fixed device 202.

As discussed above, the processor 210 of the personal wirelesscommunication device 201 monitors certain conditions 305, such as time,location, or a received instruction signal, in order to determine whento require the released individual to perform the check-in operation.When the processor 210 determines that a condition has been satisfied,the processor 210 generates a check-in notification to the user 310. Thecheck-in notification is audible and/or visual.

After the check-on notification has been generated, the processor 210starts a countdown timer 315. The processor 210 continues to monitor thecountdown timer until it either expires, or until the user completes thecheck-in procedure 325. If the timer expires 325, then the processor 210generates and sends a Check-In Fail message 335 to the check-in server150.

Meanwhile, after the check-in notification has been generated, and whilethe countdown time is running, the user moves the personal wirelesscommunication device 201 within close proximity of the fixed device 202.The personal wireless communication device 201 then sends a requestsignal 318 to the fixed device 202. The fixed device 202 receives therequest signal 320. In some embodiments, the fixed device 202 alsoreceives power from the personal wireless communication device 201. Inresponse, the fixed device 202 retrieves the unique ID of the releasedindividual from memory 330. The fixed device 340 then transmits theretrieved ID 340 back to the personal wireless communication device 201.

The personal wireless communication device 201 receives the ID 350,which causes the timer to stop 325. In other embodiments, the timer doesnot stop until check-in has succeeded, or after the countdown hasexpired. Following receipt of the ID, the processor may carry outadditional processing 360. In various embodiments, such processing mayinclude any one or more of decrypting the received ID, retrieving alocally-stored ID from memory, determining whether the received IDmatches the locally-stored ID, receiving a location of the personalwireless communication device, etc. After all relevant information hasbeen obtained, the processor 210 of the personal wireless communicationdevice 201 generates and forwards a Check-In confirmation signal to thecheck-in server.

Using the above systems and methods, the released individual is able touse his/her own personal wireless communication device for check-inprocedures. The above systems and methods ensure that the personalwireless communication is married to a fixed device. This ensures thatthe check-in procedure cannot be falsified, or attended to by anindividual other than the specific released individual.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the methods of FIG. 3 can be implementedin the environment of one or more computer systems or other processingsystems. An example of such a computer system 500 is shown in FIG. 5.One or more of the modules depicted in the previous figures can be atleast partially implemented on one or more distinct computer systems500.

Computer system 500 includes one or more processors, such as processor504. Processor 504 can be a special purpose or a general purpose digitalsignal processor. Processor 504 is connected to a communicationinfrastructure 502 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 500 also includes a main memory 506, preferably randomaccess memory (RAM), and may also include a secondary memory 508.Secondary memory 508 may include, for example, a hard disk drive 510and/or a removable storage drive 512, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 512 reads from and/or writes to a removable storage unit516 in a well-known manner. Removable storage unit 516 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 512. As will be appreciated bypersons skilled in the relevant art(s), removable storage unit 516includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 508 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 500. Such means may include, for example, aremovable storage unit 518 and an interface 514. Examples of such meansmay include a program cartridge and cartridge interface (such as thatfound in video game devices), a removable memory chip (such as an EPROM,or PROM) and associated socket, a thumb drive and USB port, and otherremovable storage units 518 and interfaces 514 which allow software anddata to be transferred from removable storage unit 518 to computersystem 500.

Computer system 500 may also include a communications interface 520.Communications interface 520 allows software and data to be transferredbetween computer system 500 and external devices. Examples ofcommunications interface 520 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, and the like. Software and data transferred via communicationsinterface 520 are in the form of signals which may be electronic,electromagnetic, optical, or other signals capable of being received bycommunications interface 520. These signals are provided tocommunications interface 520 via a communications path 522.Communications path 522 carries signals and may be implemented usingwire or cable, fiber optics, a phone line, a cellular phone link, an RFlink and other communications channels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 516 and 518 or a hard disk installed inhard disk drive 510. These computer program products are means forproviding software to computer system 500.

Computer programs (also called computer control logic) are stored inmain memory 506 and/or secondary memory 508. Computer programs may alsobe received via communications interface 520. Such computer programs,when executed, enable the computer system 500 to implement the presentdisclosure as discussed herein. In particular, the computer programs,when executed, enable processor 504 to implement the processes of thepresent disclosure, such as any of the methods described herein.Accordingly, such computer programs represent controllers of thecomputer system 500. Where the disclosure is implemented using software,the software may be stored in a computer program product and loaded intocomputer system 500 using removable storage drive 512, interface 514, orcommunications interface 520.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A system for monitoring an individual releasedfrom custody, the system comprising: a first wireless communicationdevice; and a second wireless communication device configured to:receive a request signal from the first wireless communication devicevia a short-range transceiver; retrieve a pre-stored unique identifierfrom memory; and transmit, to the first wireless communication device, aresponse signal that includes the unique identifier, the first wirelesscommunication device configured to: receive the unique identifier fromthe second wireless communication device via a short-range transceiver;compare the unique identifier received from the second wirelesscommunication device to a pre-stored preset identifier stored in amemory of the first wireless communication device; determine a successor failure of a check-in procedure based on the comparing; and generatea check-in signal based on the comparing, the check-in signal includinga timestamp, a location, and the success or failure of the check-inprocedure.
 2. The system of claim 1, wherein the second wirelesscommunication device is further configured to receive operating powerfrom the first wireless communication device.
 3. The system of claim 2,wherein the second wireless communication device is configured toreceive the operating power based on a proximity of the first wirelesscommunication device to the second wireless communication device.
 4. Thesystem of claim 3, wherein the operating power is transferred viaNear-Field Communication.
 5. The system of claim 1, wherein the firstwireless communication device is further configured to: compare theunique identifier included in the response signal to a second identifierstored in the first wireless communication device.
 6. The system ofclaim 5, wherein the first wireless communication device is configuredto determine that the check-in procedure has succeeded or failed basedon the comparing.
 7. The system of claim 5, wherein the uniqueidentifier included in the response signal is encrypted, and wherein thefirst wireless communication device is further configured to decrypt thereceived unique identifier prior to the comparing.
 8. A method ofmonitoring an individual released from custody, the method comprising: afirst wireless communication device: monitoring a condition; issuing anotification in response to detecting the condition has been satisfied;transmitting a request signal in response to a trigger via a short-rangetransceiver; receiving a response signal to the request signal, theresponse signal including a unique identifier; comparing the receivedunique identifier with a pre-stored identifier; determining success orfailure of a check-in procedure based on the comparing; and generating acheck-in signal based on the comparing, the check-in signal including atimestamp, a location, and the success or failure of the check-inprocedure; and a second wireless communication device: receiving therequest signal via a short-range transceiver; receiving operating power;retrieving the unique identifier from memory, the unique identifierhaving been pre-stored in the memory; generating the response signal;and transmitting the response signal to the first wireless communicationdevice via the short-range transceiver.
 9. The method of claim 8,wherein the generating of the response signal includes encrypting theunique identifier.
 10. The method of claim 8, further comprising thefirst wireless communication device transmitting the operating power tothe second wireless communication device.
 11. The method of claim 9,further comprising the first wireless communication device decryptingthe received unique identifier.
 12. The method of claim 8, furthercomprising the first wireless communication device comparing thereceived unique identifier with a previously-stored second uniqueidentifier.
 13. The method of claim 8, further comprising the firstwireless communication device transmitting a check-in signal to acheck-in server.
 14. A wireless communication device for monitoring anindividual, comprising: a short-range transceiver configured towirelessly communicate with a nearby fixed wireless communicationdevice, the short-range transceiver configured to transmit a requestsignal to the nearby fixed wireless communication device, and to receivea response signal that includes a unique identifier from the nearbyfixed wireless communication device; a locator configured to determine alocation of the wireless communication device; a memory that pre-storesa preset identifier; and a processor configured to: compare the receivedunique identifier with the preset identifier; determine a success orfailure of a check-in procedure based on the comparing; and generate acheck-in signal based on the comparing, the check-in signal including atimestamp, the location, and the success or failure of the check-inprocedure.
 15. The wireless communication device of claim 14, whereinthe short-range transceiver is further configured to transmit power tothe nearby fixed wireless communication device.
 16. The wirelesscommunication device of claim 15, further comprising a long-rangetransceiver configured to transmit the check-in signal to a remoteserver.
 17. The wireless communication device of claim 14, furthercomprising a decryptor configured to decrypt the unique identifierincluded in the received response signal prior to the comparing.
 18. Thewireless communication device of claim 14, wherein the short-rangetransceiver is configured to communicate using at least one ofBluetooth, infrared, and/or near field communication.
 19. The wirelesscommunication device of claim 14, further comprising a port configuredto transfer at least one of power and/or data to the nearby fixedwireless communication device.