Wearable recording system with memory designation

ABSTRACT

A surveillance apparatus continuously records imaged data from a camera into a circular buffer in a local memory. When a record signal is received, the system records the video stream that was recorded before the record signal was received, and the video stream that is recorded after the record signal was received. The recorded segment is then write-protected, so that the surveillance apparatus does not overwrite the recorded segment. The recorded segment could then be sent to a remote memory via a wireless connection to free up local memory for future recording sessions.

This application is a continuation of U.S. patent application Ser. No.15/875,828 filed on Jan. 19, 2018, which is a continuation of U.S.patent application Ser. No. 15/279,155 filed on Sep. 28, 2016 (nowissued as U.S. Pat. No. 9,912,914), which is a continuation of U.S.patent application Ser. No. 13/790,553 filed on Mar. 8, 2016 (now issuedas U.S. Pat. No. 9,485,471), which is a continuation of U.S. patentapplication Ser. No. 12/560,584, filed Sep. 16, 2009 (now issued as U.S.Pat. No. 8,692,882), which is a continuation of U.S. patent applicationSer. No. 12/268,286, filed Nov. 10, 2008 (now issued as U.S. Pat. No.7,593,034) which is a continuation-in-part of U.S. patent applicationSer. No. 11/770,920, filed Jun. 29, 2007 (now issued U.S. Pat. No.8,310,540), which claims the benefit of U.S. provisional patent60/824,097, filed Aug. 31, 2006. U.S. application Ser. No. 12/268,286 isalso a continuation-in-part of U.S. patent application Ser. No.11/846,217, filed Aug. 28, 2007 (now issued as U.S. Pat. No. 8,928,752),which claims the benefit of U.S. provisional patent 60/824,095, filedAug. 31, 2006. These and all other referenced extrinsic materials areincorporated herein by reference in their entirety. Where a definitionor use of a term in an incorporated reference is inconsistent orcontrary to the definition of that term provided herein, the definitionof that term provided herein applies and the definition of that term inthe reference does not apply.

I. FIELD OF THE INVENTION

The field of the invention is video camera recording technology.

II. BACKGROUND

Conventional camcorders use a variety of storage formats includingdigital video cassettes, mini-DV cassettes, or DVD-R discs that offer alimited amount of memory to store data. One of the major shortcomings ofthe existing camcorder technology is that the memory runs out too soon.Once a portion of the memory has been recorded, there is less memoryavailable for further recording. Then when the memory is full, usershave to return to their home/work computer or media station to transferthe recorded data from the camera to free up the memory. This createsinconvenience and inflexibility for recording on the go.

WO 2006/044476 to Vanman describes an electronic camera mounted to apolice vehicle with a circular buffer that is constantly recording. Whenthe camera reaches the end of the memory it records from the beginningof memory, erasing the earliest recorded data. Such technology is oftenemployed with surveillance cameras for long and continuous recordingwith little or no supervision. However, Vanman does not distinguish ordifferentiate any data that is of importance. To save data in thebuffer, the user of the Vanman device needs to transfer importantportions of the buffer wirelessly to a central office or physically to aDVD disc, or else risk having the interesting data be recorded overduring loop recording. Such transfers are processor intensive and maynot be possible when the central office is out of range or an empty DVDdisc is unavailable.

Vanman and all other extrinsic materials identified herein areincorporated by reference in their entirety. Where a definition or useof a term in an incorporated reference is inconsistent or contrary tothe definition of that term provided herein, the definition of that termprovided herein applies and the definition of that term in the referencedoes not apply.

EP 1064783 to Mann describes a camera mountable to a pair of eyeglassesthat continuously saves recorded images to a circular buffer in acomputer on the user's waist. When a user wants to save a piece ofrecorded video, the user must stop recording and offload the data atanother location before the user can record again. Mann also discussesstreaming the images directly to a wireless memory that may have alarger capacity; however, this means that the camera does not work inthe absence of a wireless connection. U.S. Pat. No. 5,523,799 to Hattoriet al. also describes storing data in a memory having an archivalportion. However, Hattori fails to address sending data to a remotememory.

Thus, there is still a need for a recording camera that provides betterrecording and editing functions.

III. SUMMARY OF THE INVENTION

The present invention provides apparatus, systems, and methods in whicha surveillance apparatus processes images by (1) continuously recordinga stream of imaged data, (2) write protecting segments of the recordedstream, and (3) sending write protected segments from a local memory toa remote memory using a wireless transmitter.

The surveillance apparatus generally has a camera functionally coupledto a local memory with a circular buffer. As used herein, the term “alocal memory functionally coupled to the camera” means that the memorythat is distanced less than 20 cm from the camera, and is coupled to thecamera using entirely physical connectors (e.g., wires, pins, conductivepaths, etc.). This contrasts with a “remote memory functionally coupledto the camera”, which would be a memory that is distanced from thecamera by at least 20 cm, or is coupled to the camera using a wirelessconnection. The circular buffer is preferably organized into a series ofmemory segments that loops back on itself and is organized into bothavailable segments and write-protected segments. This allows a recordingfacility to record the data stream available in portions of the circularbuffer while skipping over write-protected matter. Preferably, the localmemory is large enough to store at least 5 or 10 minutes of imaged data.

Preferably, the recording facility continuously records the data streaminto the circular buffer any time the surveillance apparatus is poweredon. As used herein, the term “continuous” with respect to recording avideo data stream means that data is recorded at least every half secondover a given ten second period. When a signal to record is sent to thesurveillance apparatus, a protecting facility designates a segment ofthe circular buffer to be write-protected to prevent that segment frombeing overwritten during the next recording loop. Part of thewrite-protected portion could be a pre-recorded subset that is recordedbefore the signal is received, while part of the write-protected portioncould be a post-recorded subset that is recorded after the signal isreceived. The pre-recorded subset could be as long as 5 seconds, 10seconds, 30 seconds, or more. Preferably, various aspects of both thepre-recorded subset and the post-recorded subset can be configured witha user interface. While the write-protected portions could beelectronically indexed using a memory heap or a clustered index, thewrite-protected portions are preferably stored as separate files in thememory. Such files could be stored in physically dis-contiguous parts ofthe circular buffer. Additionally, the indexing is preferably performedwhile the recording facility is still recording data into the memory.

The signal to record is preferably automatically triggered by a sensorthat detects an image in the camera or a sound by the camera'smicrophone. For example, the signal to record could be triggered by ahuman face, an open book, a computer screen, a whistle, a verbalcommand, a recognized object, or a pattern of knocks. Alternatively, auser interface could allow a human user to manually send the signal torecord and could even allow the human user to designate a length of timeof the pre-recorded subset or the post-recorded subset. A user couldsend two signals, one to start recording and another to stop recording,but preferably the user merely sends a signal to start recording for aspecified period of time. In an exemplary embodiment, when the specifiedperiod of time has almost expired, say, for example, 5 seconds, 10seconds, or longer, the user could extend the length of specified timeby sending another trigger to the surveillance apparatus. For example,the surveillance apparatus could send a warning 10 seconds before it isscheduled to stop recording by vibrating against the user; in responsethe user could say “don't stop” or merely cough to extend the length ofthe write-protected portion of memory.

While the surveillance apparatus could be a mounted on a hand-held videocamera, the surveillance apparatus is preferably a small device that canbe mounted inconspicuously on a person. For example, contemplatedsurveillance apparatus mounts are a pair of wearable sunglasses oreyeglasses, a lapel pin, a collar button, a hat or visor, a hair pin, ora front of a purse.

Since the surveillance apparatus is typically too small to house a largeamount of memory, the surveillance apparatus also preferably has awireless transmitter that is also functionally connected to the localmemory. A sending facility uses the wireless transmitter to transmitwrite-protected portions of the circular buffer to a remote memory thatis not physically connected to the local memory in some way. Forexample, the wireless transmitter could send write-protected portions ofthe circular buffer to a mobile phone, or the surveillance apparatuscould be plugged into a mobile phone which is then used as a wirelesstransmitter to forward a write-protected portion to another remotememory. In a preferred embodiment, after a write-protected portion ofthe circular buffer is transferred to a remote memory, the protectingfacility could remove the corresponding portion from protection so thatthe recording facility could use that portion to record data.

Various objects, features, aspects and advantages of the presentinvention will become more apparent from the following detaileddescription of preferred embodiments of the invention, along with theaccompanying drawings in which like numerals represent like components.

IV. BRIEF DESCRIPTION OF THE DRAWING

FIG. 1 is a camera mounted on a pair of glasses connected to a circularbuffer in a local memory that is controlled by a ring.

FIGS. 2A and 2B show user interface buttons for the ring of FIG. 1.

FIG. 3 shows a diagram representation of the circular buffer of FIG. 1.

FIG. 4A-4H show representations of the circular buffer of FIG. 1 whilethe surveillance apparatus is in use.

V. DETAILED DESCRIPTION

In FIG. 1, an example surveillance apparatus 100 generally comprisingeyeglasses 110 having a camera 120 mounted at the nose bridge, and anoptional viewfinder 130 applied onto one of the lenses. A data and powercord 140 couples the camera 120 to a belt-worn recorder 160, whichcooperates with a ring-shaped signaling device 150 and a remote memory170. Those skilled in the art will appreciate that the term“surveillance” is used herein in its broadest possible sense, to includenot only professional or commercial types of surveillance, but also anyother type of observation, including for example an ordinary personwatching a baseball game or birthday party.

The eyeglasses 110 are used here euphemistically to represent any typeof camera mount. In a preferred embodiment, the camera mount isdisguised to be a common object worn by a person or lying around ahouse, but could also be shaped and sized to look like a camera.Contemplated mounts include lapel pins, hair clips, shirt buttons,purses, staplers, desk clocks, tripods, head gear, hand grips, orsecurity camera mounts. As used herein the term “camera” means anydevice or collection of devices that includes an image capturingcomponent that captures image data, and a converting component thatconverts the image data into digital data, possibly at least one datastream. An image capturing component could include one or morecharge-couple devices (CCD) complimentary metal-oxide-semiconductors(CMOS), CMOS focal plane arrays (CFP), radiometers, or other manners ofimage obtaining devices. Camera 120 should be interpretedeuphemistically to include all such variants. Likewise, a suitableconverting component could include one or more analog-to-digitalconverters, software codecs, or integrated circuits.

Camera 120 contains an imager lens 122 used to focus images for camera120. Conventional lenses allow one or more of the following adjustments:aperture (to control the amount of light), zoom (to control thefield-of-view), or shutter speed (to capture continuous motion.). Inpreferred embodiments, these adjustments are automatically controlled bythe camcorder electronics, generally to maintain constant exposure ontothe imager without the manual adjustment from a user. It is contemplatedthat the preferred embodiments offer direct user control of all majoroptical functions. As with most modern digital recorders and camcorders,an analog-to-digital (ADC) converter is used to digitize the analogimager waveform output into a discrete digital-video signal. Thus, therecorder can be used to record analog or digital formats.

Viewfinder image lens 130 is calibrated to have the same field of viewas camera 120. Preferably, viewfinder image lens 130 is embedded inbetween the two glass lenses of eyeglasses 110. Preferably viewfinderimage lens 130 is a zoom lens with preferred standard zoom ration of 3 xin or out of the focal length of the camera. A more sophisticatedviewfinder image lens 130 is contemplated to have a greater zoom rangeand also has nighttime vision or is able to render images underdifferent light conditions. Within the lenses, viewfinder image lens 130is outlined by tinted area or graticle and the outline graticle isembedded with glowing fiber optic filament. Eye-glasses are madepreferably from opaque, translucent, or possibly photo gray-type tint ofglasses. Alternatively, glasses change color slightly when energized.

Where the camera is a hand-held camera and is not embedded in a pair ofeyeglasses, viewfinder image lens 130 can be permanently fixed to camera120, or it can be interchangeable with lenses of different focal lengthsand other properties depending on the need and circumstances of use.

Recorder 160 is any recording device that records video and/oraudio/video data, including conventional recorders. Recorder 160preferably includes a processor 162 with software or hardware thataccomplishes the functions described herein, or one or more physicalmemories that are collectively referred to herein as memory 166.Typically, the recorder or the camera converts analog images into adigital format to be stored in the memory, or also preferably recordsboth audio and video input analog signals from the camera to the memory.Those skilled in the art will also appreciate that the conceptsdescribed herein with respect to video and/or audio/video data can beapplied to recordation of purely audio, or in fact any other type ofdata stream; this specification should be interpreted as expresslyincluding such application. A wearer could clip recorder 160 as a beltclip or another compact device. Contemplated recorders include MP3players, purses, or buttons. It is also contemplated that recorder 160could also comprise a cell or mobile phone having a suitable recorderapplication installed that is configured to communicate with the othercomponents of apparatus 100.

Although not expressly shown, recorder 160 also includes an appropriatepower supply or connection, supporting electronics, or a display orother interface. The power source can vary considerably. For example, inembodiments where the recorded is relatively large, a suitable powersource can include a rechargeable battery. On the other hand, when therecorder is relatively small, an appropriate power source can include anexternal power source (e.g., transformer for wall outlet or cigarettelighter adapter). Whether embodied in control buttons or in some othermanner, it is also contemplated that recorder can include some sort ofsecurity control requiring a password and some sort of automatic turnofffeature that activates after a certain amount of inactivity.Authentication or authorization of user access provides for ensuring aproper user of apparatus 100 retains desired control. For example, oncea user is authenticated, the user can control indexing, editing,transmitting, or adjusting content data in memory.

Recorder 160 would typically record images in digital format, but analogor combination formats are also contemplated. Preferably, the recorder'selectronics are preferably all on a unitary printed circuit board withdifferent functions, or facilities, encoded on a programmable chip ordisk. For example, a recording facility 163 could record the data streamfrom camera 120 to local memory 166, a protecting facility 164 couldprotect segments (not shown) of recorded data on memory 166, or asending facility 165 could transmit protected segments (not shown) ofrecorded data to remote memory 170. While the different facilities arepreferably part of a single hardware or software program, the facilitiescould be split into different components as necessary. Other facilitiescould be installed, for example a facility that allows editing of thereceived image data or protected data. It is contemplated that suchfacilities could be purchased through or installed on a cell phone,possibly through an on-line application store.

The contemplated memory could vary depending on the particularconfiguration of the recorder. Particularly suitable memories includecommercially available micro hard drives with a 1-inch disc (which canpreferably have a capacity of more than 1 GB), flash memory cards with acapacity of up to 128 MB and more, or other transient and/or permanentmemory units. Likewise, suitable memory can also include SDRAM, MRAM,racetrack memory, SIMM, DIMM, etc. with a capacity of at least 32 MB,more preferably at least 64 MB, or most preferably above 128 MB. Inpreferred embodiments, memory 166 is a SDRAM capable of storing at least1000 frames of data. Once received by memory 166, frames are preferablycompressed by employing conventional compression rates and methods toachieve at least a 50:1 ratio.

In preferred embodiments, image data received by recorder 160 is storedin a circular buffer 167 on memory 166. Preferably, all of the freespace in memory 166 is used to create circular buffer 167, however,multiple circular buffers could be created in the memory where thereexist multiple cameras connected to a single recorder. Once the recorderis turned on, image data is continuously stored in circular buffer 167for access. If no record or protect button is pushed, the recorder willloop back and store the image data for a said length of time. Recording,book-marking and protecting are used synonymously herein. Recording,book-marking and protecting means that a portion of the imaged data iswrite-protected upon an activation of a signal by a user and can notthen be overwritten unless the write-protection is later removed.Consequently, protected data cannot be overwritten by newly storedimaged data in the circular buffer.

The circular buffer is preferably large enough to store at least 3minutes of data, more preferably 5 minutes and most preferred 10 minutesof data. However, it is contemplated that depending on the size andcapacity of the device, any length longer or shorter is possible. It ispreferred when the recorder is turned on the entire circular buffer istreated and stored as a single file. Thus, if no recording is protectedor bookmarked, then the entire file will be erased and the recordingwill start at the beginning of the circular buffer.

Signaling device 150 is shown in the figure as a ring that communicateswirelessly (e.g., BlueTooth, Skinplex, wireless USB, 802.11, 802.15,UWB, Z-Wave, IrDa, Zigbee, etc.) with the recorder, possibly as part ofa personal area network (PAN). The ring can have any suitable interface,shown in FIGS. 2A and 2B, including for example buttons on its outerperiphery, or a sensor along its inner edge. In FIG. 2A, ring 150 hasuser interface 200, with a start signal button 210, a stop signal button220, a transmit button 230, a zoom in button 240, or a zoom out button250. Alternatively, the buttons could have decorative symbols in lieu ofwords of function as shown in FIG. 2B, or could even have arbitrarysymbols surrounding the entirety of signaling device 150. These buttonsallow a user to manipulate and control image data and to generateprotected data.

In an alternative embodiment, turning the ring in one direction mightproduce a start signal, and continuing to turn the ring in thatdirection might extend backwards the time period that is protected.Where a default time period for storing pre-start signal data is used,extending the time can be considered overriding the default. Similarly,turning the ring in the opposite direction might produce a stop signal,and where a default time period for storing post-start signal data isused, extending the time can be considered overriding that default.Electronics for such a ring or other control device are readilyavailable, and for example are similar to those used in key fobs.Indeed, signaling device 150 should be interpreted euphemistically toinclude key fob type device.

It is contemplated that the signaling device could be integrated intoother items as an accessory and that is wearable on an individual, forexample a lapel pin or a pen within a pocked protector. It is alsocontemplated that the switch could be portable or can be hidden orattached to other devices such as a vehicle, furniture, etc. The signalcould also be generated in non-tactile ways, for example by an audiocommand or whistle, or by an automatic sensor. Preferably, the usercould configure the audio signal to match only his/her voice.

At any moment, the user can signal recorder 160 to place a “bookmark” inthe recording. This signal can be sent by pressing a button that willthen transmit a signal through wires 140 that attach to the glasses thento the recorder. The wires 140 could be fiber optic wires that are smalland thin to avoid detection. In an exemplary embodiment, the user couldcontrol the entire system using signaling device 150, for example byturning the camera on and off, recording a portion of image data, stopthe recording, zooming in and out of image data; or transmittingprotected data into the remote memory 170.

While remote memory 170 is shown in the figure as a mobile or cellphone, remote memory 170 should be interpreted euphemistically toinclude any memory that is not connected to surveillance apparatus 100,for example, a DVD writer, a wireless network attached storage (NAS)device, a wireless storage area network (SAN) device, a home computer,or even a second surveillance apparatus. Preferably, sending facility165 sends protected segments of circular buffer 167 wirelessly to remotememory 170 whenever remote memory 170 is within range of wirelesstransceiver 169, possibly as part of a PAN using one or more wirelesscommunication technologies (e.g., BlueTooth, Skinplex, wireless USB,802.11, 802.15, UWB, Z-Wave, IrDa, Zigbee, etc.). However, sendingfacility 165 could also respond to manual commands, for example througha button on signaling device 150, recorder 160, or the mobile phoneitself. In an alternative embodiment, the mobile phone does not act as aremote memory depository, and instead forwards the protected segment toa remote memory via a mobile internet or wi-fi connection. Preferably,once protected data is transferred to a remote memory, the protectedmemory areas then will go back to become free memory areas that areavailable for further loop recording.

Write-protected data could be sent to the remote memory by an imagesensor that outputs data directly in “block” format typically convertedwith a raster-to-block converter. Further compression could be usedbefore transmitting the data if wireless bandwidth is an issue. EitherDCT or wavelet transformed data on native sensor formats could be used.The data is preferably transmitted via the Internet, but could also betransmitted using radio waves, a pager, a two-way pager, a physicalcable, email, text message, picture message, or any other suitablecommunication mechanism.

FIG. 3 shows a diagram representation of circular buffer 167 in memory166, with unprotected segment 320 and write-protected segment 330.Write-protected segment 330 is characterized as a predefined portion ofthe recording data. The recording facility 163 continuously records thedata stream 310 into circular buffer 167. The recording facility 163records over unprotected segment 320 of circular buffer 167, whileskipping over protected segments 330 of circular buffer 167. It iscontemplated that the portion of the circular buffer that is marked aswrite-protected data cannot be overwritten once the recorder loops backto the beginning of the media.

FIGS. 4A-4H show an alternative diagram representation of a circularbuffer 300 as it is being used.

In FIG. 4A the recording facility (not shown) records data stream “A”into circular buffer 400. The “_” character is used to designate blankmemory, or unprotected memory that can be overwritten. The ellipsis “ .. . ” is used to show that the memory can be very large relative to thenumber of positions shown in the figure. It is contemplated, forexample, that memory 400 can be up to several hundred megabytes, 1 GB, 2GB, 4 GB, 8 GB, or even more. Such memory is preferably of a flash type,non-volatile RAM, preferably in the form of a standard flash memorycard. In a preferred embodiment, circular buffer 400 comprises a logicalrepresentation of a physical memory area. Buffer 400 can be configuredto store data in the physical memory by taking into accountwear-leveling across the physical memory.

In FIG. 4B the protecting facility (not shown) has protected a recentperiod of data stream “A” as a function of a start signal, shown by thecharacter “|”. The start signal can be triggered in any suitable manner,including for example manual operation of a trigger or a switch by auser. For example, the ring of FIG. 1 could be used as a switch, or anyother wearable accessory could have a switch integrated into it. Inother examples, start signals can be triggered by detection of aparticular circumstance by a motion, sound or other sensor. In anexemplary system, software can operate upon content in the data stream,such as by monitoring an entrance to a building using a data streamreceived from one or more cameras, and could then send a start signalwhen the image shows a person loitering in a certain area of the screen.

The “[” character is used to designate the start of protected memory.Concomitantly, the portion of the data stream prior to the protectedportion has once again been marked “_” to show that it is unprotected.In protecting recent data, the system can protect a default historicaltime period before the start signal is sent and protect a default periodafter the start signal is sent (such as 30 seconds, 2 minutes, etc). Allsuitable defaults are contemplated. Alternatively, the historical timeperiod being protected could be altered in some manner, such as bysoftware or by a user operating a history button. For example, if a userhits a start button, the system might default to protecting the last 30seconds and the next 60 seconds; or it might protect the last 15 secondsand the next 2 minutes.

Preferably, before the protecting facility stops protecting data, thesystem sends a signal to the user that the system is about to stopwrite-protecting data. For example, the system could send an audio chirpsignal, or in the case of a pair of eyeglasses, a portion of the glassescould slightly vibrate to signal that the system will stop recording in10 seconds. If the user wishes to protect an additional 60 second timeperiod, the user could hit a “more time” button. In this manner a usercould protect a 5 or 10 minute period, or an even much longer portion ofa data stream prior to a start signal. Indeed, if memory 400 isinterpreted as a multi gigabyte flash memory, it is entirely possiblethat one could back up sufficiently to protect an hour or more of such adata stream.

In FIG. 4C the protecting facility has received a “stop” signal sometime after receiving the start signal, thereby lengthening the protectedportion of the “A” data stream. The stop signal is shown as character“]” and could be automatically generated from software or hardware as afunction of a default time after the start signal, or could be manuallysent by the user of the system. All suitable defaults are contemplated,including for example a 30 second or 1 minute time period. Stop signalscould also be generated in a variable fashion, again as a function ofsoftware or hardware, through action of a user, or in any other suitablemanner. Thus, a user can well operate a start button or other switch, amore time switch, and a stop switch, which could have the same ordifferent interfaces. It is also contemplated that the system couldrecognize a user's verbal commands for these functions.

Just as the system can utilize a default pre-start signal period of timefor which a portion of the data stream is stored unless overridden insome manner, contemplated systems can utilize a default post-startsignal period of time for which a portion of the data stream is storedunless overridden in some manner. Using defaults for both pre-start andpost-start signal periods allows a system to operate with an extremelyhigh level of user convenience. For example, in one contemplated classof systems using such defaults, a user could operate a single button,ring or other interface to initiate a start signal, and the system couldrespond by automatically storing a default 60 second portion of a datastream prior to the signal, as well as a default 30 time period of thedata stream after the signal. And all of that could be accomplished witha single operation of the button. An interface could also be provided toallow the user to alter the length of time for the pre-recorded portionand the length of time for the post-recorded portion. As should beapparent from the description above, all reasonable the default timeperiods are contemplated.

In FIG. 4D, the system has finished protecting the desired portion ofthe “A” data stream, and the recording facility continues to store a “B”data stream into circular buffer 400. Of course, the “B” data stream canbe contiguous with the “A” data stream, so that differentiation of “A”and “B” streams is merely an artifact of how the data is being stored.For example, if a system included an eyeglasses camera being used atbaseball game, the wearer might watch the game for an hour or morewithout anything of interest happening. During all that time the systemwould record image frames from the camera, looping in memory if thememory had remaining capacity for less than an hour of images. Whenfinally the wearer sees an interesting play that he wants to protect, heoperates a start button, or perhaps a more time button to protect theprevious minute of play. Once the interesting action has completed, heoperates a stop button, which thereby causes the system to completeprotecting the entire “A” period of interest. But the wearer continueswatching the game, and the subsequent images, continuous with the “A”images, would be considered “B” images. In some embodiments, the wearercan select to have more of previously recorded data to be protected. Forexample, once the wearer operates the start button, the wearer couldalso indicates that additional previously recorded data should beprotected (e.g., past 10 seconds, 30 seconds, one minute, five minutes,etc.) while new image data is being stored and protected.

In FIG. 4E the system has again received a start signal, and has againprotected a fixed or variable historical time period. In FIG. 4F thesystem has received a stop signal, and has protected the entire desiredportion of the “B” data stream.

In FIG. 4G the system has continued to record data, which is nowdepicted as data stream “C” because it follows data stream “B”. Thisfigure is particularly significant in that recordation of the “C” datastream skips over the protected portion of the “A” data stream. In FIG.4H the system received another start signal, and has protected a desiredportion of the “C” data stream that straddles the protected “A” stream.As shown, the C data stream is saved as a physically dis-contiguousfile.

In a preferred embodiment, segments of recorded data are“write-protected” by being indexed in an electronic index. This schemeallows the system to protect previously recorded areas of memory withoutinterrupting any concurrent recording, and further allows the system toeasily locate such protected segments for play-back or offloading to aremote memory. Additionally, this allows the system to keep track ofmultiple fragments dis-contiguous fragments of a single write-protectedsegment. The electronic index is preferably a hash table or a clusteredindex, but other methods of addressing memory are also suitable.

Protected data can be copied to a memory separate from the circularbuffer, for example in a separate file within a local memory. Multiplesegments of protected data could thus be stored as a series of protectedfiles in a directory structure. In an exemplary embodiment, as soon asthe data is designated in the index as being protected, the recordersearches for a remote memory in range, and immediately copies theprotected data from the circular buffer to the remote memory. Onceconfirmation of copying is received, the index can be updated toidentify the previously protected portion of the circular buffer asbeing non-protected.

As previously discussed, a sending facility uses a wireless transmitterto transmit write-protected data to a remote memory. One should notethat there are many additional aspects of the inventive subject mattersurrounding transmitting the data to the remote memory. In someembodiments a surveillance apparatus participates in a PAN with othercomponents including the remote memory. In such embodiments theapparatus can discover other components of the system, including theremote memory or signaling devices, by sending message over one or moresuitable protocols (e.g., BlueTooth, Skinplex, wireless USB, 802.11,802.15, 802.16, UWB, Z-Wave, IrDA, Zigbee, etc.). Component discoverycan be via a push where the apparatus sends a discovery message over aprotocol to remote components or via a pull where the remote componentssend a discovery message to the apparatus. The components of the systemcan respond with a discovery response message. Preferred discovery ordiscovery response messages comprise characteristics of the variousresponding components including buffer size, read/write rates,authentication, authorized command sets, or other parameters. Forexample, the surveillance apparatus could send a discovery message outto discover any suitable remote memories in the PAN where the message isencapsulated in a BlueTooth protocol packet. A cell phone could respondby allocating a memory area to operate as a remote memory and by sendinga discovery response message back to the apparatus describing the amountof memory available. Such an approach provides for creating surveillanceapparatus products that are able to operate across multiple cell phoneplatforms by allowing a cell phone user to download or install anapplication, or possibly a driver for their specific cell phone model,capable of being discovered and operating with the apparatus.

Another aspect of transmitting data to the remote memory includesauthenticating the various components with respect to access or tocontrol remote memory. In some embodiments, the surveillance apparatus,or even the signaling facility, can be authenticated with the remotememory via a suitable token exchange (e.g., passwords, public-privatekey, handshakes, etc.). For example, a remote memory could be bound to aspecific apparatus via a secret key, possibly having a UUID or GUID.Furthermore, the components of the system can be authorized to accessvarious levels of functionality based on their authentication. Someapparatus could have read only access, while other could have writeaccess, or while still others have editing capabilities.

Yet another aspect of transmitting data to the remote memory includesthe remote memory providing access to multiple surveillance apparatus.For example, a single remote memory, possibly a cell phone, could be inclose proximity (e.g., physically local within 100 meters or logicallylocal within the same network) to two or more apparatus. The remotememory can provide image storage as necessary to each apparatus,assuming appropriate authentication or permissions. In addition, it iscontemplated that a single apparatus could have more than one camerawhere each camera has its data transmitted to the remote memorycollectively via the apparatus or even individually, possibly where eachcamera has access to different remote memories, or different areas(e.g., files) in the same remote memory.

One should also note that a surveillance apparatus can employ multiplewireless protocols to interact with the various components. For example,the apparatus's signaling device could connect to a recorded via Zigbeeor Skiplex protocols while the apparatus could connect to the remotememory via IEEE 802.16.

One purpose of the invention is to allow secret recording by a user. Theuser can integrate the recorder as part of his/her wardrobe or even asclothing accessories, such as a pin or a hat. Preferably, recorder willrecord video and audio as seen from the wearer's point of view withoutrequiring the wearer to exert any special effort to operate therecorder. The recorder operates for extended periods of time whileremaining unobtrusive both to the wearer/operator and to the subject(s)being recorded.

In order for the device to be practical, physical size and weight are ofprimary importance. The recorder portion must be small and lightweightenough to be unobtrusive. Preferably, the size of the recorder is twoinches by three inches by one-half inch and six ounces in weightincluding battery. The camera or imaging component must be small andlightweight enough to be mounted on a pair of eyeglasses withoutconspicuous bulk or uncomfortable weight on the order of one-quarterinch by one-quarter inch by one inch or smaller and weighing one ounceor less. Further, the imaging component must be capable of sufficientresolution that the image quality of the resulting recording iscomparable with existing consumer camcorder products. Preferredresolutions are at least 640×480 pixels. However, more preferredresolutions include high definition quality resolutions (e.g., 720p,1080i, 1080p, 2160p, etc.).

Since the recorder will be worn on the body and the wearer can moveactively about when the device is in operation, it is important that theentire device be mechanically rugged and that all components,particularly the storage media, be impervious to the shocks resultingfrom such body movement. The device is also likely to be exposed toenvironmental stresses such as dust and moisture so the components andpackaging must accommodate this exposure. Solid state media such ascompact flash memory is particularly suitable as the recorder's storagemedia since it meets these requirements.

Alternatively, the recorder device can be mounted on vehicles, planes orany other objects for ease of use. It is contemplated that the presentinvention can be used in military or field intelligence operations.

The advantages of the disclosed techniques are clear. A user of theinventive subject matter can capture image data while also participatingwith others in an event without being trapped behind a recording device.Furthermore, the user's hands can remain substantially free whilerecording.

Thus, specific embodiments and applications of recording images to acircular buffer in a local memory and transmitting it wirelessly to aremote memory have been disclosed. It should be apparent, however, tothose skilled in the art that many more modifications besides thosealready described are possible without departing from the inventiveconcepts herein. The inventive subject matter, therefore, is not to berestricted except in the spirit of the appended claims. Moreover, ininterpreting both the specification and the claims, all terms should beinterpreted in the broadest possible manner consistent with the context.In particular, the terms “comprises” and “comprising” should beinterpreted as referring to elements, components, or steps in anon-exclusive manner, indicating that the referenced elements,components, or steps can be present, or utilized, or combined with otherelements, components, or steps that are not expressly referenced. Wherethe specification claims refers to at least one of something selectedfrom the group consisting of A, B, C . . . and N, the text should beinterpreted as requiring only one element from the group, not A plus N,or B plus N, etc.

What is claimed is:
 1. A recording system for saving a sequence of clipscomprising: at least one memory communicatively coupled with a sensor;and a computer processor configured to: record sensor data obtained bythe sensor in the at least one memory; in response to a first triggersignal, designate for write-protecting a first portion of the sensordata that was captured prior to occurrence of the first trigger signal,wherein the first portion of the sensor data occupies a portion of theat least one memory that is less than the entirety of the at least onememory and corresponds to a length of time prior to the first triggersignal; continuing to record the sensor data in the at least one memorywhile the first portion of the sensor data is designated forwrite-protecting; in response to a subsequent second trigger signal,designate for write-protecting a second portion wherein the secondportion occupies less than the remaining entirety of the at least onememory not designated for write-protecting and corresponds to a lengthof time prior to the second trigger signal; and upon reaching at leastone of the first portion and the second portion while continuing torecord the sensor data in the at least one memory, excluding fromoverwriting the at least one of the first portion and second portion. 2.The recording system of claim 1, further including with the firstportion of the sensor data, another portion of the sensor data that wascaptured after occurrence of the first trigger signal.
 3. The recordingsystem of claim 2, wherein the computer processor is further configuredto, in response to an end signal, end the first portion of the sensordata captured after the occurrence of the first trigger signal that isdesignated as write-protected.
 4. The recording system of claim 3, wherein the end signal comprises at least one of: an expiration of apre-defined length of time; an audio command; a stop button signal; astop switch signal; or a recognized object within the sensor data. 5.The recording system of claim 1, wherein the computer processor isfurther configured to transmit, via a wireless transmitter, the firstportion of the sensor data to a remote memory.
 6. The recording systemof claim 1, wherein the sensor data comprises at least one of thefollowing: image data and video data.
 7. The recording system of claim1, wherein a portion of the at least one memory comprises a circularbuffer.
 8. The recording system of claim 1, wherein the first portion ofthe sensor data is stored using at least one of time compression orframe compression.
 9. The recording system of claim 1, furthercomprising a camera that includes the sensor, the at least one memory,and the computer processor.
 10. The recording system of claim 9, whereinthe camera comprises a security camera.
 11. The recording system ofclaim 1, further comprising a cell phone including the sensor, the atleast one memory, and the computer processor.
 12. The recording systemof claim 1, further comprising a personal area network coupled with thecomputer processor and including at least two of the following: thesensor, the at least one memory, and the computer processor.
 13. Therecording system of claim 1, wherein the at least one memory isconfigured to record the first portion of the sensor data in a file. 14.The recording system of claim 1, wherein the first trigger signalrepresents detection of at least one of the following: a motion, asound, an image, content in a data stream, a pattern in the sensor data,a person, a human face, a computer screen, an event, a verbal command,operation of switch, and operation of a button.
 15. The recording systemof claim 1, wherein the computer processor is further configured towrite-protect the first portion of the sensor data as a write-protectedportion in the at least one memory.
 16. The recording system of claim15, wherein the computer processor is further configured to free thewrite-protected portion following a transmission of the first designatedportion.
 17. The recording system of claim 1, wherein the computerprocessor is further configured to index the first designated portionwhile the recording facility is still recording the sensor data into theat least one memory.
 18. The recording system of claim 1, wherein thecomputer processor is configured to record the sensor data continuously,from before the first trigger signal, through a pre-designated timeperiod, and after the pre-designated time period.
 19. The recordingsystem of claim 1, wherein the computer processor is configured toautomatically overwrite portions of the sensor data that were recordedin the at least one memory that were not designated for saving.
 20. Arecording system for saving a sequence of clips comprising: at least onememory communicatively coupled with a sensor; and a computer processorconfigured to: record sensor data obtained by the sensor in the at leastone memory; in response to a first trigger signal, write-protecting afirst portion of the sensor data that was captured prior to occurrenceof the first trigger signal, wherein the first portion of the sensordata occupies a portion of the at least one memory that is less than theentirety of the at least one memory and corresponds to a length of timeprior to the first trigger signal; continuing to record the sensor datain the at least one memory while the first portion of the sensor data iswrite-protected; in response to a subsequent second trigger signal,write-protecting a second portion wherein the second portion occupiesless than the remaining entirety of the at least one memory notwrite-protected and corresponds to a length of time prior to the secondtrigger signal; and upon reaching the at least one of the first portionand the second portion while continuing to record the sensor data in theat least one memory, excluding from overwriting the at least one of thefirst portion and second portion.