Inmate tracking system in a controlled environment

ABSTRACT

A monitoring system and a method for operating the monitoring system in an inmate tracking system in a controlled environment is disclosed. The monitoring system receives video and audio data from devices located within the controlled environment and organizes the video and audio data within profiles that allow for searches of the video and audio to be performed. The monitoring system analyzes the video and audio data and generates the profiles to include identified objects associated with the video and audio data.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. Nonprovisional patentapplication Ser. No. 17/009,101 (Attorney Docket No. 3210.1440002) filedSep. 1, 2020, titled “Inmate Tracking System in a ControlledEnvironment,” which is a continuation of U.S. Nonprovisional patentapplication Ser. No. 15/488,180 (Attorney Docket No. 3210.1440000) filedApr. 14, 2017, titled “Inmate Tracking System in a ControlledEnvironment,” now U.S. Pat. No. 10,762,353, issued Sep. 1, 2020, thecontents of which are hereby incorporated herein by reference in theirentireties.

BACKGROUND Field

This disclosure relates to tracking inmates within a controlledenvironment through the use of video and audio analysis including objectidentification and audio recognition.

Background

In a controlled environment, such as a correctional facility or prison,keeping track of inmates and their behaviors is essential to maintainingthe safety of the controlled environment and other inmates. Prior artmethods can be either tedious, requiring manual inspection andinteraction by guards, or expensive, requiring specialized devices, suchas wristbands, attached to each inmate (which itself may require a guardto manually scan each device). Specialized devices may includeradio-frequency chips to allow for easier tracking but such specializeddevices require battery replacement or recharging. Moreover, specializeddevices require expensive infrastructure to support the tracking of thespecialized devices through the controlled environment.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a partof the specification, illustrate embodiments of the present disclosureand, together with the description, further serve to explain theprinciples of the disclosure and to enable a person skilled in thepertinent art to make and use the embodiments.

FIG. 1 illustrates a block diagram of an exemplary inmate trackingsystem, according to embodiments of the present disclosure.

FIG. 2A illustrates a block diagram of an exemplary implementation ofvideo cameras in a prison for use in the exemplary inmate trackingsystem of FIG. 1 , according to embodiments of the present disclosure.

FIG. 2B illustrates a block diagram of an exemplary implementation ofvideo cameras and standalone microphones in a prison for use in theexemplary inmate tracking system of FIG. 1 , according to embodiments ofthe present disclosure.

FIG. 2C illustrates a block diagram of an exemplary implementation ofstandalone microphones in a prison for use in the exemplary inmatetracking system of FIG. 1 , according to embodiments of the presentdisclosure.

FIG. 3 illustrates a block diagram of an exemplary monitoring system foruse in the exemplary inmate tracking system of FIG. 1 , according toembodiments of the present disclosure.

FIG. 4 illustrates an exemplary video camera for use in the exemplaryinmate tracking system of FIG. 1 , according to embodiments of thepresent disclosure.

FIG. 5 illustrates an exemplary inmate profile for use in the exemplaryinmate tracking system of FIG. 1 , according to embodiments of thepresent disclosure.

FIG. 6 illustrates an exemplary location profile for use in theexemplary inmate tracking system of FIG. 1 , according to embodiments ofthe present disclosure.

FIG. 7 illustrates a flowchart diagram of an exemplary method foranalyzing and indexing video for use in the exemplary inmate trackingsystem of FIG. 1 , according to embodiments of the present disclosure.

FIG. 8 illustrates a flowchart diagram of an exemplary method foranalyzing and indexing video and/or audio for use in the exemplarytracking system of FIG. 1 , according to embodiments of the presentdisclosure.

FIG. 9 illustrates a flowchart diagram of an exemplary method forprocessing search requests of video for use in the exemplary inmatetracking system of FIG. 1 , according to embodiments of the presentdisclosure.

FIG. 10 illustrates a flowchart diagram of an exemplary method foranalyzing video and detecting certain activity for use in the exemplaryinmate tracking system of FIG. 1 , according to embodiments of thepresent disclosure.

FIG. 11 illustrates a block diagram of a general purpose computer thatmay be used to perform various aspects of the present disclosure.

The present disclosure will be described with reference to theaccompanying drawings. In the drawings, like reference numbers indicateidentical or functionally similar elements. Additionally, the left mostdigit(s) of a reference number identifies the drawing in which thereference number first appears.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the disclosure. Rather, the scope ofthe disclosure is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact result from computing devices,processors, controllers, or other devices executing the firmware,software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the disclosure that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or customize for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such modifications are intended tobe within the meaning and plurality of equivalents of the exemplaryembodiments based upon the teaching and guidance presented herein. It isto be understood that the phraseology or terminology herein is for thepurpose of description and not of limitation, such that the terminologyor phraseology of the present specification is to be interpreted bythose skilled in relevant art(s) in light of the teachings herein.

Exemplary Inmate Tracking System

FIG. 1 illustrates a block diagram of an exemplary inmate trackingsystem 100, according to embodiments of the present disclosure. In someembodiments, inmate tracking system 100 includes a controlledenvironment 101, such as a prison, a monitoring system 109, and anetwork 108 that provides communications between controlled environment101 and monitoring system 109. In some embodiments, monitoring system109 is co-located with controlled environment 101, such as in adesignated room within controlled environment 101. In other embodiments,monitoring system 109 may be located remotely from controlledenvironment 101. Network 108 may include any or all of a Local-AreaNetwork (LAN), a Wide-Area Network (WAN), or the Internet, depending onthe location of monitoring system 109 in relation to controlledenvironment 101. For example, network 108 is implemented as a LAN whenmonitoring system 109 is co-located with controlled environment 101. Inanother example, network 108 is implemented as a WAN or the Internetwhen monitoring system 109 is located at remotely from controlledenvironment 101.

In some embodiments, inmate tracking system 100 also includes network110 and workstations 111 and 112. Although only two workstations aredepicted in FIG. 1 for simplicity, any number of workstations are withinthe scope of the disclosure. Network 110 may include any or all of aLocal-Area Network (LAN), a Wide-Area Network (WAN), or the Internet,depending on the location of workstation 111 and/or workstation 112 inrelation to monitoring system 109. For example, network 110 isimplemented as a LAN when workstation 111 and/or workstation 112 isco-located with monitoring system 109. In another example, network 110is implemented as a WAN or the Internet when workstation 111 and/orworkstation 112 is located remotely from monitoring system 109.Workstations 111-112 provide authorized personnel access to inmatetracking features of monitoring system 109 which are discussed inadditional detail herein.

In some embodiments, controlled environment 101 includes video cameras102A-102C, an access point 103, mobile devices 104A-104B, digital videorecorder 105, and standalone microphone 113. Although only one accesspoint, one digital video recorder, one standalone microphone, and threevideo cameras are depicted in FIG. 1 for simplicity, any number ofaccess points, digital video recorders, and video cameras are within thescope of the disclosure. Similarly, although only two mobile devices aredepicted in FIG. 1 for simplicity, any number of mobile devices arewithin the scope of the disclosure. Moreover, although only onemonitoring system is depicted in FIG. 1 for simplicity, any number ofmonitoring systems are within the scope of the disclosure. For example,a number of monitoring systems can be distributed throughout controlledenvironment 101 and can communicate with each other over a network, suchas network 108.

In some embodiments, video cameras 102A-102C are implemented throughoutcontrolled environment 101. For example, one or more video cameras canbe implemented in each room of controlled environment 101. Video cameras102A-102B can provide and receive information through access point 103and video camera 102C can provide information through digital videorecorder 105. Access point 103 receives data from and provides data tonetwork 108 through connection 106. Digital video recorder 105 receivesdata from and provides data to network 108 through connection 107. Insome embodiments, connections 106 and 107 are wired connections, such asusing a USB or Ethernet cable. In some embodiments, connections 106 and107 are wireless connections, such as Bluetooth™ or Wi-Fi. Access point103 can be implemented as any device that provides network access suchas, but not limited to, a router, a smartphone, a tablet, or a laptopdevice. Digital video recorder 105 can be implemented as any device thatrecords, processes, and stores video data received from video camera102C. Both access point 103 and digital video recorder 105 can providevideo data received from video cameras 102A-102C to monitoring system109 through network 108.

In some embodiments, video cameras 102A-102C have wired and/or wirelesscommunication capabilities. For example, video camera 102A communicateswith network 108 through a wired connection, such as through a USB orEthernet cable, with access point 103. Video camera 102B communicateswith network 108 through a wireless connection, such as Bluetooth™ orWi-Fi, with access point 103 which relays information to and from videocameras 102A and 102B. Video camera 102C can communicate with network108 through a wired connection, such as through a USB or a video/powercable that provides both video communication and power capabilities tovideo camera 102C. In some embodiments, video cameras can be connectedto both access point 103 and digital video recorder 105. For example,video camera 102C has communication interfaces that enable connectionsto both access point 103 and digital video recorder 105. Accordingly,video data from video camera 102C can be stored in digital videorecorder 105 and transmitted through access point 103.

In some embodiments, any or all of video cameras 102A-102C can haveinfrared capability through the implementation of a thermal sensor. Insome embodiments, any or all of video cameras 102A-102C have “smart”capability and can pre-process video data prior to sending the videodata to monitoring system 109. Examples of pre-processing include butare not limited to performing preliminary object detection, imagerecognition, object tagging, behavior identification, and alertfunctionality. In such embodiments, the pre-processed information andthe video data are transmitted to monitoring system 109. In someembodiments, in order to save bandwidth, only the pre-processedinformation is transmitted and the video data can be subsequentlytransmitted, such as at night when bandwidth usage of the system islower.

Mobile devices 104A-104B are handheld devices and can be used byauthorized personnel of controlled environment 101. In some embodiments,mobile devices 104A-104B are provided by controlled environment 101 toits employees, such as prison guards, for use to interact with andreceive alerts as part of inmate tracking system 100. For example,mobile devices 104A-104B are in communication with monitoring system 109through network 108 and can receive messages and other information sentby monitoring system 109. Mobile devices 104A-104B also are incommunication with video cameras 102A-102C and can receive video streamsand other information sent by video cameras 102A-102C. Mobile devices104A-104B can communicate with network 108 through access point 103using a wireless connection such as Bluetooth™ or Wi-Fi. Mobile devices104A-104B can also have cellular networking capability, such as 4Gand/or Long Term Evolution (LTE), and can communicate with monitoringsystem 109 through a cellular network.

In some embodiments, standalone microphone 113 can be implementedthroughout controlled environment 101. For example, one or morestandalone microphones can be implemented in each room of controlledenvironment 101. Standalone microphone 113 can provide and receive audioinformation through access point 103 and/or digital video recorder 105.Access point 103 receives data from and provides data to network 108through connection 106. Digital video recorder 105 receives data fromand provides data to network 108 through connection 107. Both accesspoint 103 and digital video recorder 105 can provide audio data receivedfrom standalone microphone 113 to monitoring system 109 through network108. In some embodiments, standalone microphone 113 has wired and/orwireless communication capabilities. For example, standalone microphone113 communicates with network 108 through a wired connection, such asthrough a USB or Ethernet cable, with access point 103 and may alsocommunicate with network 108 through a wireless connection, such asBluetooth™ or Wi-Fi.

FIG. 2A illustrates a block diagram of an exemplary implementation ofvideo cameras in a prison 200 for use in the exemplary inmate trackingsystem of FIG. 1 , according to embodiments of the present disclosure.Prison 200 represents an exemplary embodiment of controlled environment101 of FIG. 1 . In some embodiments, prison 200 includes cell block 201,dining hall 202, video conference room 203, commissary 204, hallway 205,and exercise yard 206. While FIG. 2 depicts prison 200 with thesedefined areas, other implementations, layouts, number of areas, andtypes of areas are within the scope of the disclosure. Each defined areaof prison 200 can be configured with a video camera for recording andtransmitting video information for its area. For example, video camera207A is installed in cell block 201, video camera 207B is installed indining hall 202, video camera 207C is installed in hallway 205, videocamera 207D is installed in video conference room 203, video camera 207Eis installed in commissary 204, and video camera 207F is installed inexercise yard 206. FIG. 2 merely depicts an exemplary configuration ofvideo cameras. Other configurations, such as increased number of camerasin each area and the placement of cameras in each area, are within thescope of the disclosure.

In some embodiments, prison 200 also includes mobile device 208, accesspoint 209, and digital video recorder 210 which represent an exemplaryembodiments of mobile devices 104A-104B, access point 103, and digitalvideo recorder 105 of FIG. 1 respectively. Although only one mobiledevice, one access point, and one digital video recorder are depicted inFIG. 2 for simplicity, any number of mobile devices, access points, anddigital video recorders within prison 200 are within the scope of thedisclosure. In some embodiments, mobile device 208 can be implementedas, but not limited to, a smartphone, a tablet, or a handheld device. Insome embodiments, prison 200 provides mobile device 208 to authorizedpersonnel such as a guard. Access point 209 provides networkcommunication to devices such as video cameras 207D-207F and mobiledevice 208 in prison 200 including receiving and transmitting video datafrom video cameras 207C-F. Digital video recorder 210 records andtransmits video data from video cameras 207A-207C. Network communicationmay include wireless connections, such as Bluetooth™ or Wi-Ficonnections, or a wired connection such as a USB cable and a Ethernetcable. In prison 200, video cameras 207A-207F provide video data (and,in some embodiments, audio data) to monitoring system 109 for trackingthe movements and determining locations of people, including inmates andguards, within prison 200. Functions of monitoring system 109 withrespect to video (and audio analysis) are discussed further with respectto FIG. 3 .

FIG. 2B illustrates a block diagram of an exemplary implementation ofvideo cameras and standalone microphones in a prison 250 for use in theexemplary inmate tracking system of FIG. 1 , according to embodiments ofthe present disclosure. Prison 250 represents an exemplary embodiment ofcontrolled environment 101 of FIG. 1 . In some embodiments, prison 250has a similar implementation of devices as prison 200, discussed withrespect to FIG. 2A, but further includes standalone microphones213A-213F.

Standalone microphones 213A-213F can be configured to detect and recordsounds at various locations of prison 250. For example, in someembodiments, standalone microphones 213A-213F are positioned in eacharea of prison 250. Other implementations, such as the number ofstandalone microphones, their positions with prison 250, and the layoutof the prison 250 are within the scope of the invention.

Standalone microphones 213A-213F can record surrounding sounds proximateto their location and independently of video cameras 207A-207F. In someembodiments, standalone microphones 213A-213F are connected to accesspoint 209 and/or digital video recorder 210. When connected to eitheraccess point 209 or digital video recorder 210, standalone microphones213A-213F provide recorded audio data to monitoring system 109 overnetwork 108 for further analysis. In prison 250, video cameras 207A-207Fand standalone microphones 213A-F provide video data and audio data tomonitoring system 109 for tracking the movements and determininglocations of people, including inmates and guards, within prison 250.Functions of monitoring system 109 with respect to video and audioanalysis are discussed further with respect to FIG. 3 .

When connected to access point 209, standalone microphones 213A-213Fprovide recorded audio data for storage in monitoring system 300, suchas in database 336. When connected to digital video recorder 210,standalone microphones 213A-213F provide recorded audio data for storagein digital video recorder 210 for later retrieval by monitoring system300. For example, monitoring system 300 can retrieve recorded audio datafrom digital video recorder 105 at a predetermined schedule such as on aspecific day or days at a specific time or times. Standalone microphones213A-213F may further include automatic gain control (AGC) forincreasing the microphones ability to detect and record sounds in avariety of ambient noise locations.

FIG. 2C illustrates a block diagram of an exemplary implementation ofstandalone microphones in a prison 280 for use in the exemplary inmatetracking system of FIG. 1 , according to embodiments of the presentdisclosure. Other implementations, such as the number of standalonemicrophones, their positions with prison 250, and the layout of theprison 250 are within the scope of the invention.

Prison 280 represents an exemplary embodiment of controlled environment101 of FIG. 1 . Prison 280 has a similar layout as prison 200, discussedwith respect to FIG. 2A, but only includes standalone microphones213A-213F. As discussed with respect to FIG. 2B, standalone microphones213A-213F may be connected to access point 209 and/or digital videorecorder 210. In prison 290, standalone microphones 213A-F provide audiodata to monitoring system 109 for tracking the movements and determininglocations of people, including inmates and guards, within prison 250.Functions of monitoring system 109 with respect to audio analysis arediscussed further with respect to monitoring system 300 in FIG. 3 .Standalone microphones 213A-213F may further include automatic gaincontrol (AGC) for increasing the microphones ability to detect andrecord sounds in a variety of ambient noise locations.

Exemplary Monitoring System

FIG. 3 illustrates a block diagram of an exemplary implementation of amonitoring system 300 for use in the exemplary inmate tracking system ofFIG. 1 , according to embodiments of the present disclosure. In someembodiments, monitoring system 300 represents an exemplary embodiment ofmonitoring system 109 of FIG. 1 . Monitoring system 300 includes but isnot limited to processing subsystem 310, database 336, and one or moreworkstation(s) 338. Processing subsystem 310 includes one or moreprocessors, computers, or servers identified as subsystems and can beconstructed as individual physical hardware devices, or as virtualdevices, such as a virtual server. The number of processing subsystemscan be scaled to match the number of simultaneous user connectionsdesired to be supported by an inmate tracking system such as inmatetracking system 100 of FIG. 1 . Processors of processing subsystem 310control the operation of communication subsystem 312, authenticationsubsystem 314, video analysis subsystem 316, and audio analysissubsystem 340.

In an embodiment, communication subsystem 312 controls the routing ofvideo data between devices in prison 200 and monitoring system 300.Further, communication subsystem 312 logs information related to thevideo data, including but not limited to timestamps, identification ofinmates within the video data, identification of behavior within thevideo data, and stores the logs and video data as files. The filesstored by communication subsystem 312 can be stored indefinitely for useby monitoring system 109 in monitoring and investigation of inmates inprison 200. In an embodiment, communication subsystem 312 is configuredto receive video data from video cameras 102A-102C and communicate withmobile devices 104A-104B.

Authentication subsystem 314 collects and stores identity data ofinmates within inmate tracking system 100. Identity data includes but isnot limited to at least one of a username and password data, challengequestions, challenge answers, biometric data, device data such as makeand model of a communication device, and/or location data. Biometricdata includes one or more of a finger print, a hand print, a voicesample, an iris or retinal sample, a facial image of the user (2D or3D), a gait identification, a hand geometry, a signature identification,an infrared camera identification, or any other biometric as deemedappropriate. Authentication subsystem 314 is further configured tofacilitate a secure communication between video cameras 207A-207F withinprison 200 and monitoring system 300.

In some embodiments, authentication subsystem 314 also includes identitydata of authorized personnel of inmate tracking system 100 utilizingmobile devices 104A-104B. Authentication subsystem 314 ensures thatmobile devices 104A-104B are utilized by the correct personnel andallows mobile devices 104A-104B to log into inmate tracking system 100.Once logged in, mobile devices 104A-104B can receive alerts frommonitoring system 109, can receive video feeds from video cameras102A-102C, and otherwise access tracking functionality provided bymonitoring system 109.

Video analysis subsystem 316 further includes, but is not limited to,object identification module 318, inmate identification module 320,profile module 322, alert module 324, behavior analysis 326, gaitanalysis 328, search module 330, clip generator 332, graphical userinterface (GUI) module 334. Although multiple modules are depicted inFIG. 3 , any number of modules for performing the features of videoanalysis subsystem 316 is within the scope of the disclosure. Forexample, video analysis subsystem 316 can include a single module forperforming the features described herein. In some embodiments, videoanalysis subsystem 316 receives and processes video data received fromvideo cameras in inmate tracking system 100. Processing the video datacan include, but is not limited to, identifying objects within the videodata, performing image recognition of the data, performing requestedsearches of inmates or identifiers, performing predefined analysisroutines on video data, and updating inmate profiles based on theanalyzed video. Objects are any identifiable item within video data andcan include but are not limited to persons (e.g. inmates, guards),identifying marks (e.g., tattoos), physical objects (e.g., knives), andbehaviors (e.g., fights) occurring within video data.

In some embodiments, object identification module 318 processes videodata by detecting objects within each frame of the video todifferentiate between people and objects within the video data. Objectidentification module 318 identifies object identification informationwithin the video data. Examples of object identification informationinclude but are not limited to facial data and object data. Objectidentification module 318 identifies facial data of people within thevideo data and transmits the identified facial data to inmateidentification module 320 to identify the person or persons in thevideo. Object data within a video can include identifying marks ofinmates such as serial numbers located on the uniforms, tattoos, andscars, as well as detecting illegal or legal objects within the prisonsuch as weapons or mobile devices. Object identification module 318transmits any object data, such as possible identifying marks to inmateidentification module 320 to identify the person or persons in thevideo. Video data also includes a camera identifier of the camera thatcaptured the video. The camera identifier can be used by video analysissubsystem 316 to determine the location where the video was captured.

Object analysis performed by object identification module 318 caninclude retrieving images stored in database 336 and comparing objectdata from the video with the retrieved images. Images in database 336can include images of allowed and restricted objects that have beenapproved by administrators of the controlled environment. For example,images of allowed objects can include, but are not limited to, approvedmobile devices. Images of restricted objects can include, but are notlimited to, contraband items such as mobile devices and weapons.

In some embodiments, assigning specific objects to an inmate includesassociating images of the specific objects to the inmate's profile (asdiscussed further with respect to FIG. 5 ). Accordingly, objectsidentified by object identification module 318 and inmates identified byinmate identification module 320 (discussed further below) can becross-referenced with the inmate's profile to determine whether the heldobject is associated with the inmate, with another inmate, or iscontraband. For example, monitoring system 300 receives a video thatincludes a clip of an inmate holding a mobile device. Objectidentification module 318 can identify the mobile device and inmateidentification module 320 can identify the inmate. Either objectidentification module 318 or inmate identification module 320 can thendetermine, based on the inmate's profile whether the identified mobiledevice corresponds to the identified inmate. As further discussed belowwith respect to alert module 324, alerts can be conditioned on detectionof contraband items or objects in possession by the wrong inmate.

In some embodiments, inmate identification module 320 receives possibleidentifying information, such as facial data, serial numbers, tattoos,and scars, from object identification module 318. Inmate identificationmodule 320 attempts to match the received identifying information tostored identifying information. Stored identifying information can bestored within inmate profiles in any database accessible to monitoringsystem 300 such as database 336. Inmate profiles are described in moredetail with regard to FIG. 5 . In some embodiments, inmateidentification module 320 formats the identifying information so that itcan be compared to the stored identifying information. Facial data caninclude but is not limited to facial data points representing thecharacteristics of a person's face such as distances between eyes, nose,and mouth and shapes of the eyes, nose, mouth, jaw. Facial data can alsoinclude a facial identifier created from, for example, a hash function,of the facial data points.

Inmate identification module 320 can send the formatted (if necessary)identifying information to profile module 322 which searches data inprofiles stored in database 336. For example, upon receiving facialdata, inmate identification module 320 can format the facial data into aformat that can be compared with facial data stored in inmate profiles.For example, facial data stored in inmate and location profiles mayinclude a different number of facial data points or store the facialdata as a facial identifier. If the facial data from objectidentification module 318, inmate identification module 320 can convertthe facial data into a facial identifier that can be used by profilemodule 322. Profile module 322 performs the comparison between thefacial data received from inmate identification module 320 and facialdata stored in inmate and location profiles. Profile module 322 canreturn a list of possible matches and a confidence score which indicatesthe similarity between the facial data of the video data and in theinmate and location profiles.

Inmate identification module 320 can also attempt to identify persons invideo through other identifying marks such as identification placed onuniforms or body marks. For example, object identification module 318can detect certain numbers or marks on a uniform and transmit thesenumbers to inmate identification module 320. Inmate identificationmodule 320 can determine the numbers and submits a request to profilemodule 322 to determine whether the determined numbers correspond to anyinmate's serial number by searching inmate and location profiles for thedetermined numbers. Similar search functionality applies for otheridentifying marks such as tattoos or scars.

Inmate identification module 320 can also maintain a count of and trackinmates within a specific location over a defined time duration. Forexample, inmates can be required to walk past video camera 207B indining hall 202 before being allowed to obtain their food. Inmateidentification module 320 can confirm the identity of each inmate beforebeing allowed in line. In this manner, inmate identification module 320can track the number of inmates in dining hall 202 and prevent inmatesfrom doubling back in line in an attempt to obtain a second meal. Theinformation from inmate identification module 320 is stored inappropriate inmate profiles based on the identified inmates in the videodata and also is used by other modules in video analysis subsystem 316.For example, if inmate identification module 320 identifies that aninmate is attempting to enter the line in dining hall 202 a second time,alert module 324 (discussed further below) can send an appropriate alertmessage to authorized personnel based on the relevant alert rule.

While previous discussion of inmate identification module 320 has beenlimited to identifying inmates, inmate identification module 320 canalso identify employees of prison 200 such as the guards based on thesame principles of facial recognition and object identification.

Profile module 322 also updates inmate and location profiles based onthe identified information from inmate identification module 320. Forexample, if inmate identification module 320 identifies a certain inmatein a certain area of profile module 322, profile module 322 will updatethe inmate's profile to indicate the inmate's location history as wellas the location profile to identify the inmate. The location history caninclude the name of the area, the time and date that the inmate wasdetected in the area, a screen shot of the inmate from the video, and/ora clip of the video in which the inmate was identified.

In some embodiments, alert module 324 sends alerts to designatedofficials such as guards having mobile devices 104A-104B and/orworkstations 111-112. Alerts can be triggered based on rules establishedmy administrators of controlled environment 101. For example, rules canspecify sending alert messages based on conditions such as detecting acertain inmate in an unauthorized area of controlled environment 101,detecting restricted behavior by an inmate or inmates, detecting that acertain inmate is not present in a mandatory area, such as his cell, ata specific time, detecting that certain persons of different known gangsare in proximity to each other. Alert module 324 can store the alertrules in memory internal to alert module 324 or external memory such asdatabase 336. Alert rules can be location-based rules (e.g., an inmateis not allowed in video conference room 203 or exercise yard andauthorized personnel should be alerted when the inmate is detected inthese locations), behavior-based rules (e.g., authorized personnel areto be alerted when behavior analysis 326 detects a potential fight),relationship-based rules (e.g., authorized personnel are to be alertedwhen an inmate is detected near another inmate), or object-based rules(e.g., detection of contraband, detection of objects held by theincorrect inmate).

In some embodiments, behavior analysis 326 receives video data fromobject identification module 318 and, utilizing behavior algorithms,analyzes the video data to identify any behaviors in the video data. Insome embodiments, behavior analysis 326 performs its analysis inreal-time based on video streamed to monitoring system 300. Real-timeanalysis of behavior in video can be linked to rules in alert module 324and alert messages can be triggered based on behavior-based rules.Behaviors include, but are not limited to, fights, suicide attempts,threats, and assaults. Behavior algorithms can work with other modulesof video analysis subsystem 316 to identify behaviors based on, forexample, a predefined number of people within the video, the location inwhich the video was captured, the identified people within the video,and the types of movements occurring in the video.

For example, inmate identification module 320 can detect a number ofdifferent people within a video, profile module 322 can identify thedifferent people as being involved in different known gangs who have ahistory of hostile behavior, and behavior analysis 326 can determinethat the different people are within a certain proximity of each otheror are walking towards each other. Behavior algorithms can utilize thisinformation to determine that a fight is occurring or is imminent. Asanother example, behavior algorithms can detect a number of fastmovements occurring in the video data of video camera 207B in dininghall 202. Based on these factors, behavior algorithms can determine thata fight is occurring and sends the determination to alert module 324 fortriggering the appropriate alert messages and to profile module 322 forupdating profiles to indicate their involvement in the fight and thelocation where the fight is taking place.

In some embodiments, gait analysis 328 attempts to identify personsbased on the detected gait in video data. Inmate identification module320 can detect the gait or walking mechanics of a person in the videodata and send this detected information to gait analysis 328. Gaitanalysis 328 then compares the received detected information to storedgait information for each prisoner and employee of controlledenvironment 101. Gait information of each inmate can be stored eachinmate's inmate profile (e.g., 500 in FIG. 5 ). Gait informationincludes data points regarding the inmate's biomechanics while walkingsuch as the positioning of the inmate's arms, legs, feet, head, andbody. Moreover, the stored gait information in the inmate profile can becontinuously updated over time while the inmates are in prison. Forexample, gait analysis 328 can analyze each video of the inmate walkingin prison captured by video cameras determine data points regarding theinmate's biomechanics while walking. Gait analysis 328 can then updatethe inmate's profile based on the additional data points. Such a featureaccommodates changes to an inmate's gait such as from an injury.

In some embodiments, search module 330 receives search requests fromauthorized personnel such as through workstation(s) 338 and/or mobiledevices 104A-104B. A search request can include the name of an inmateand/or employee, the names of multiple inmates and/or employees anidentifying mark such as a tattoo, a specific location in prison 200(e.g., cell block 201, dining hall 202, or hallway 205), a specific timewindow (e.g., a date and time period), and a specific event (e.g., afight, video conferences). Search requests may include a text entry suchas typing an inmate's name through a browser or application onworkstation(s) 338 and/or mobile devices 104A-104B, an image such as ascanned photo or photo downloaded from an external mug shot database.For example, a search request can include the names or identifyinginformation for two inmates and search module 330 searches stored videodata for any video that includes the two inmates.

In some embodiments, clip generator 332 processes video data intoshorter video clips based on people identified in the video data and thetype of behavior identified in the video data. The shorter video clipscan then be stored in inmate profiles based on the identified inmatesand/or in database 336. Processing the video data into shorter videoclips can reduce the storage needed to store the video data and canincrease the speed for searching. For example, clip generator 332 cangenerate video clips of an certain inmate based on received video dataand stores the generated video clips in the inmate's profile for easyaccess and retrieval. Similarly, clip generator 332 can generate videofor any behavior such as fights which allows authorized personnel toquickly search for all clips that include fights.

In some embodiments, GUI module 334 adds visual annotations to storedvideo data and generated video clips to aid authorized personnel duringa search. GUI module 334 receives identification information from inmateidentification module 320 and adds visual annotations such as a tagplaced adjacent to the identified inmate in the video data or clip.

In some embodiments, processing subsystem 310 further includes an audioanalysis subsystem 340 for processing audio data from video cameras207A-F and/or standalone microphones 213A-F. In some embodiments, audioanalysis subsystem 340 includes voice recognition module 342 and ambientnoise module 344. Analysis of audio data can include voice recognition,performed by voice recognition module 342. For example, audio analysissubsystem 340 can parse audio data to detect voices within the audiodata, generates an audio clip that includes the detected voice, andprovides the generated audio clip to inmate identification module 320.In some embodiments, inmate identification module 320 can perform voicerecognition through stored biometric information. For example, inmateidentification module 320 can retrieve a voice sample from inmateprofiles and compare the voice sample with the voices identified in thevideo data. Inmate identification module 320 can then identify an inmateon the basis of this comparison.

Audio analysis can further include decibel detection, performed byambient noise module 344. For example, video analysis subsystem 316 candetect the decibels of sound recorded in the video and perform voicerecognition of voices in the video data. The decibels and voicerecognition can be used by behavior analysis 326 as part of itsdetermination as to the type of behavior in the video data (e.g., loudsounds can indicate a fight).

Audio data provided by standalone microphones 213A-F further includeslocation information within a prison. Location information of standalonemicrophones 213A-F allows monitoring system 300 to correlate analysis ofaudio data with corresponding analysis of video data based on a specificlocation. Location information of standalone microphones 213 furtherallows monitoring system 300 to tag audio data based on location andstore the audio data in appropriate profiles for later retrieval. Audiodata further includes timestamp information to indicate the date andtime of the audio data.

In some embodiments, audio data can be used to supplement video analysisperformed by video analysis subsystem 316. Audio analysis subsystem 340can perform audio analysis independently of video analysis and theresults of the analysis by audio analysis subsystem 340 can be used toincrease confidence and reduce false positives in the results ofanalysis by video analysis subsystem 316. For example, video analysissubsystem 316 can analyze video data (e.g., image recognition) todetermine the identities of inmates within the video data. Similarly,audio analysis subsystem 340 can analyze audio data (e.g., audiorecognition) to also determine the identifies of inmates within theaudio data. The results of the image recognition and audio recognitioncan be compared to increase or decrease confidence by reducing falsepositives in the results of the analysis.

In some embodiments, audio analysis subsystem 340 can perform real-timemonitoring and analysis of audio data provided by standalone microphones213A-F. Transmitting video data has greater bandwidth requirements thantransmitting audio data because audio data is typically smaller in filesize compared to video data. Accordingly, some prisons may desire torely primarily on audio data analysis to reduce strain on the prison'snetwork infrastructure. Accordingly, monitoring system 300 can implementtracking features through analysis of audio data. For example, audioanalysis subsystem 340 performs location determination through audiorecognition of audio data received from a microphone within standalonemicrophones 213A-213F to identify inmate or inmates within a certainarea of a prison. Audio analysis subsystem 340 can perform movementtracking by correlating identified inmates, the location information ofstandalone microphones 213A-F, and timestamp information of the audiodata to estimate the movement of inmates through different areas of theprison.

Database 336 includes any number of databases and/or servers, and storesand organizes data in a relational database. Database 336 runs adatabase management system, such as MYSQL′, to provide an example.Database 336 also includes organized data such that respective identitydata, authentication data, jurisdictional requirements and rules, andsettings that are indexed and linked to allow access to video data foreach of the parties. Database 336 can store analyzed audio data,unprocessed audio data, unprocessed video data, analyzed video,generated audio clips, generated video clips, inmate profiles, and anyother information associated with inmate tracking system 100. Database336 also stores metadata associated with videos and audio. Metadata ofvideos include inmates identified within the videos, locations of videocameras where the videos were recorded, and any other objects oridentifying information identified within the videos as determined byvideo analysis subsystem 316 and audio analysis subsystem 340.

Workstation(s) 338 provides access to features of monitoring system 300.Workstation(s) 338 includes applications that allow for authorizedpersonnel to search for video data and/or clips based on search queries,view real-time video data, view stored video data, receive alertmessages, and provide alert conditions for triggering the alertmessages.

Exemplary Video Camera

FIG. 4 illustrates a block diagram of an exemplary implementation of avideo camera 400 for use in the exemplary inmate tracking system of FIG.1 , according to embodiments of the present disclosure. In someembodiments, video camera 400 represents an exemplary embodiment ofvideo cameras 102A-102C of FIG. 1 . Video camera 400 includes but is notlimited to processor circuitry 410, imaging sensor 420, trackingcircuitry 430, communication interfaces 440, and microphone 450.

Processor circuitry 410 includes one or more processors 411, circuitry,and/or logic configured to control the overall operation of video camera400, including the operation of imaging sensor 420, tracking circuitry,communication interfaces 440, and microphone 450. Processor circuitry410 further includes memory 412 to store data and instructions. Memory412 may be any well-known volatile and/or non-volatile memory that isremovable and/or non-removable.

Imaging sensor 420 depends on the type of video camera 400. In someembodiments, imaging sensor 420 can be implemented as a charge coupleddevice (CCD) or complementary metal oxide semiconductor) CMOS sensor forvideo camera 400. In some embodiments, if video camera 400 is aninfrared camera, imaging sensor 420 is implemented as a CCD sensor, aCMOS sensor, or a specialized infrared sensitive image sensor.

In some embodiments, video camera 400 includes tracking circuitry 430that can perform certain inmate tracking features such as objectdetection and sending alerts. Tracking circuitry 430 includes alertmodule 431 and tracking module 432. Alert module 431 can be configuredto transmit alerts based on certain conditions detected by trackingmodule 432. In some embodiments, video camera 400 lacks the processingcapability of monitoring system 300 and therefore only performs certainreal-time analysis of video data in tracking module 432. A function oftracking module 432 includes detecting the presence of a person orpersons within video data. Alert module 431 can include a rule thattriggers an alert conditioned on the detection of any person within arestricted area during a specific time of day (e.g., hallway 205 at 3:00AM). By having video camera 400 perform this preliminary analysis, alertmessages can be transmitted more quickly to authorized personnel.

In some embodiments, in order to save bandwidth over a network, trackingmodule 432 can condition the transmission of video data from videocamera 400 to monitoring system 300 based on detected activity (e.g.,detecting the movement of a person) in a video. For example, videocamera 400 does not stream video data to monitoring system untiltracking module 432 detects activity in the video. When the detectedactivity is detected, tracking module 432 can send a signal to processorcircuitry 410 to transmit the video data from video camera 400 tomonitoring system 300. In some embodiments, video camera 400 can buffera predetermined amount of video in memory 412. Video transmitted byprocessor circuitry 410 can include real-time time video as well as anyvideo buffered by memory 412. Moreover, tracking module 432 also detectwhen the activity has stopped (e.g., detecting that there has not beenany movement) and can signal processor circuitry 410 to stoptransmitting video data.

In some embodiments, communication interfaces 440 includes wirelessmodule 441 and/or wired interface 442. Wireless module 441 enables videocamera 400 to communicate with a network through a wireless connectionsuch as such as Bluetoot™ or Wi-Fi. Wired interface 442 enables videocamera 400 to communicate with a network through a wired connection,such as through a USB, Ethernet cable, or video/power cables.

In some embodiments, video camera 400 includes a microphone 450 whichcan be utilized to record sound data associated with recorded videodata. Audio data from video camera 400 can be analyzed by audio analysissubsystem 340 of monitoring system 300 as discussed above with respectto FIG. 3 . In some embodiments, microphone 450 can further include anautomatic gain control module 451 which increases the ability ofmicrophone 450 to detect audio activity in low ambient noise locations.

Exemplary Profiles

FIG. 5 illustrates an exemplary inmate profile 500 for use in theexemplary inmate tracking system of FIG. 1 , according to embodiments ofthe present disclosure. Inmate profile 500 allows inmate profile system100 store analyzed video data that enables search and retrievalfeatures. Inmate profile 500 allows information in video data to beorganized and displayed to authorized personnel in a more efficientmanner than simply searching through an entire video stream. Inmateprofile 500 enables inmate profile system 100 to store specific videodata and associate the video data to terms or metadata that can besearched using, for example, workstation(s) 338. Inmate profile 500 canbe associated with each inmate in controlled environment 101. Inmateprofile 500 merely shows an exemplary embodiment for an exemplaryinmate. It should be understood that inmate profiles are customizedbased on the specific information for each inmate. Accordingly, inmateprofiles can vary for each inmate. The discussion of the data in inmateprofile 500 is merely to highlight an exemplary organization of aninmate's information.

Search requests of inmates that include search terms such as theinmate's name or identifying marks are compared with the informationstored in inmate profile 500 in order to determine whether there is amatch. A match can result in retrieving the associated video data suchas one or more video clips that are associated with the search terms.

Data in inmate profile 500 can be updated automatically by profilemodule 322 of monitoring system 300 and/or manually by authorizedpersonnel from workstation(s) 338. For example, profile module 322 canreceive identification information regarding the inmate, a screen shotand clip of the inmate, and other data from modules in video analysissubsystem 316. Profile module 322 updates inmate profiles based on thisreceived data. Additionally, authorized personnel may manually populateor update inmate profiles such as at the time of booking or whenestablishing alert rules for the specific inmate. In some embodiments,each inmate has a corresponding inmate profile stored in, for example,database 336 of monitoring system 300.

Exemplary inmate profile 500 identifies the name 501 of the inmate andincludes additional fields and rules including but not limited to serialnumber field 502, identification field 503, allowed locations field 504,restrictions field 505, location history field 506, and relationshiphistory field 507. Other types of fields and rules associated with aninmate are within the scope of the invention. For example, inmateprofile 500 can include associated object images of objects that havebeen assigned to the inmate. Examples of objects include but are notlimited to mobile devices that been provided for use by the inmate.Inmate profile 500 can store information in database 336 in monitoringsystem 300 in any manner including as a plurality of fields in a tableof a database, as a linked listed structure, or as an array.

Serial number field 502 is associated with data element 508 which holdsthe inmate's serial number. The serial number can be manually input byauthorized personnel through workstation(s) 338.

Identification field 503 is associated with identification data element509 which can hold any biometric information associated with the inmatesuch as facial identifier 509A, identifying marks 509B, gait mechanics509C, and an audio identifier 509D. Identification field 503 can beinput and updated at any time. For example, facial identifier 509A canbe generated from the inmate's mug shot when the inmate is booked intocontrolled environment 101. In some embodiments, facial identifier 509Ais generated from facial data points extracted from an image or imagesof the inmate. In some embodiments, facial identifier 509A is the resultof hashing or performing comparable processing to reduce the facial datapoints into a single unique identifier. In some embodiments, facialidentifier 509A is represented as a number of separate facial numberdata points. Facial identifier 509A can be used during an inmateidentification process, as further discussed in FIG. 7 , as a basis ofcomparison with facial data points retrieved from video data.

Similarly, mark identifier(s) 509B that represent an inmate's marks suchas tattoos or scars can be automatically input into inmate profile 500through object identification of images taken of the inmate at booking.For example, as part of the booking process, images of the inmatesidentifying marks (and face, as discussed above) can be taken. Theseimages are provided to the monitoring system 300 which can extract thenecessary data points for storage in inmate profile 500 and which formthe basis of comparison when searches are performed. For example,similar to generating the facial identifier 509A, monitoring system 300can generate mark identifier(s) 509B based on mark data points extractedfrom the images. In some embodiments, mark identifier(s) 509B are theresult of hashing or performing comparable processing to reduce the markdata points into a single unique identifier. In some embodiments, markidentifier(s) 509B are represented as a number of separate facial numberdata points. Mark identifier(s) 509B can be used during an inmateidentification process, as further discussed in FIG. 7 , as a basis ofcomparison with facial data points retrieved from video data.

Additionally or alternatively, mark identifier(s) 509B can includemanually input information, such as through workstation(s) 338. Manuallyinput information can include textual descriptions of the mark, such as“orange phoenix tattoo.”

Gait mechanics 509C can be based on recording the inmate's walking atthe time of booking, converting the recording to a series of gait datapoints associated with the inmate's gait, and storing the data points asgait mechanics 509C as a basis of comparison when searches areperformed. In some embodiments, gait mechanics 509C can be based onsampled video of the inmate walking in the prison and as capture byvideo cameras within the prison. In some embodiments, gait mechanics509C can be updated based on sampled video. Audio identifier 509D can bebased on recording the inmate's voice and can be used as a basis ofcomparison for performing voice recognition by audio analysis subsystem340 of monitoring system 300. Audio identifier 509D can be updated overtime while the inmate uses audio devices within the prison. For example,inmate's voice data can be updated by using audio recordings of theinmate's phone calls within the prison and that have been stored in adatabase, such as an Inmate Telephone System (ITS).

Monitoring system 300 may use additional video data to continuouslyupdate identification field 503 by retrieving additional imaging datapoints (e.g., facial information) of the inmate. Similarly, monitoringsystem 300 may use additional audio data to continuously updateidentification field 503 by retrieving additional audio data points(e.g., voice information) of the inmate. For example, monitoring system300 may be provided access to additional sources of the inmate's visualand audio information. Additional sources can include but are notlimited to real-time or stored inmate video visitation videos, crimescene videos, publically available videos (e.g., from the inmate'ssocial media accounts), and recorded telephone calls made through theprison's telephone system. Monitoring system 300 may then analyze theadditional video and/or audio data, retrieve the inmate identificationinformation from the additional video and/or audio data, and update theinmate's identifying information in identification field 503.

Allowed locations field 504 is associated with locations data element510 which includes areas of controlled environment that the inmate isauthorized to be located such as a first location 510A (e.g., theinmate's cell block) and a second location 510B (e.g., dining hall).Allowed locations field 504 provides information to alert module 324 forgenerating alerts when appropriate. For example, authorized personnelcan established location-based rules that the inmate is allowed indining hall. Alert module 324 can retrieve these allowed locations anddetermine whether to trigger alerts based on the rules and detectedinmate information.

Restrictions field 505 is associated with restrictions data element 511which includes any restricted locations, relationships, or behaviorsassociated with the inmate such as a restricted location 511A (e.g.,exercise yard) or a restricted relationship 511B (e.g., another inmate).Restrictions field 505 provides information to alert module 324 forgenerating alerts when appropriate. For example, authorized personnelcan established location-based rules that the inmate is restricted frombeing in the exercise yard or relationship-based rules for sendingalerts when an inmate is near another inmate. Alert module 324 canretrieve these restrictions and determine whether to trigger alertsbased on the rules and detected inmate information.

Location history field 506 is associated with data element 512 whichincludes a history of the locations in controlled environment 101 inwhich the inmate has been detected such as a first detected location512A and a second detected location 512B. First detected location 512Aincludes video information regarding the video in which the inmate isidentified such as a date of the video clip, time duration of the videoclip, location of the camera that detected the inmate, and is associatedwith audio/video data element 514. Video information can be providedautomatically by video analysis subsystem 316. Audio/video data element514 includes a screenshot 514A, video clip 514B, and audio clip 514Cassociated with the first detected location 512A. Audio clip 514C isprovided if available such as when video cameras 207A-F includemicrophones (such as microphone 450) or when prison includes standalonemicrophones (such as standalone microphones 213A-213F). In someembodiments, only video data is stored in audio/video data element 514.Screenshot 514A and video clip 514B can be provided automatically byclip generator 332 of video analysis subsystem 316. Audio clip 514C canbe provided automatically by audio analysis subsystem 340 if the prisoninclude microphones. Audio/video data element 514 can store the actualfiles (e.g., the actual image, actual video clip file, or actual audiofile) or can contain a pointer to the files stored in a separatelocation.

Similarly, second detected location 512B includes video informationregarding a second video in which the inmate is identified and isassociated with audio/video data element 515 that includes screenshot515A, video clip 515B, and audio clip 515C of the identified inmate inthe particular location. Alert module 324 of video analysis subsystem316 can utilize location history field 506 for generating alerts basedon location-based rules.

Relationship history field 507 is associated with relationship dataelement 513 which includes a history of the relationships in controlledenvironment 101 based on the inmates or personnel of controlledenvironment 101 with whom the inmate has been proximally detected.Relationship data element can include relationship entries such as afirst detected relationship 513A and a second detected relationship513B. First detected relationship 513A includes video informationregarding the video in which the inmate is identified with another partysuch as a date of the video clip, time duration of the video clip, thename of the other party, a location of the camera that detected therelationship, and is associated with audio/video data element 516. Videoinformation can be provided automatically by video analysis subsystem316 and audio data can be provided by microphone 450 or standalonemicrophones 213A-F, if available. Audio/video data element 516 includesa screenshot 516A and video clip 516B associated with the first detectedrelationship 513A. Screenshot 516A and video clip 516B can be providedautomatically by clip generator 332 of video analysis subsystem 316.Audio clip 516C can be provided automatically by audio analysissubsystem 340 if the prison include microphones. Audio/video dataelement 516 can store the actual files (e.g., the actual image, actualvideo clip file, or actual audio file) or can contain a pointer to thefiles stored in a separate location.

Similarly, second detected relationship 513B includes video informationregarding a second video in which the inmate is identified with anotherperson and is associated with audio/video data element 517 that includesscreenshot 517A, video clip 517B, and audio clip 517C of the identifiedinmate and the other person. Alert module 324 of video analysissubsystem 316 can utilize relationship history field 507 for generatingalerts based on relationship-based rules.

As discussed above, inmate profile 500 is merely exemplary. The fieldsdiscussed above can be organized in a different manner, excluded fromthe profile, and additional information can be included in inmateprofile 500. For example, inmate profile 500 can also include voicesamples and other biometric information of the inmate. For example, aspreviously discussed, if video data includes sounds identified asvoices, monitoring system 300 can compare the identified voices withinthe video data to voice samples stored in inmate profile 500. Inmateprofile 500 can also be updated to include video data that includes anyvoice information identified as being associated with the inmate.

Inmate profile 500 is intended to serve as a central repository for allinformation related to an inmate and to enable searches of video data tobe performed based on the information stored in inmate profile 500. Theinformation in inmate profile 500 generally is populated based on imagerecognition features of the inmate's face, marks, gait, and otheridentifying features of the inmate. The information in inmate profile500 is intended to increase the efficiency of searches for the inmate'sinformation and to retrieve associated video corresponding to the inmateand the search inquiries.

In some embodiments, employees of the prison, such as guards also havecorresponding profiles, such as guard profiles that have substantiallysimilar data records as described above with respect to inmate profile500. For example, employee profiles would also have facial data of theemployee so that they can be identified in video data. Such a featurewould enable inmate tracking system to differentiate between employeesof the prison and the inmates.

FIG. 6 illustrates an exemplary location profile 600 for use in theexemplary inmate tracking system of FIG. 1 , according to embodiments ofthe present disclosure. In contrast to inmate profile 500, locationprofile 600 organizes analyzed video based on the specific location ofcontrolled environment. Similar to inmate profile 500, location profile600 allows inmate profile system 100 store analyzed video data thatenables search and retrieval features in a more efficient manner thansimply searching through an entire video stream of a location. Locationprofile 600 enables inmate profile system 100 to store specific videodata and associate the video data to terms or metadata that can besearched using, for example, workstation(s) 338. Location profile 600organizes information for each inmate. Other methods of organizinganalyzed video data are within the scope of the disclosure which is notlimited to inmate profile 500 and location profile 600.

Workstation(s) 338 can submit search requests that include search termssuch as the inmate's name or identifying marks that are compared withthe information stored in location profile 600 in order to determinewhether there is a match. A match can result in retrieving theassociated video data such as one or more video clips that areassociated with the search terms. Similar to inmate profile 500, data inlocation profile 600 can be updated automatically by profile module 322of monitoring system 300 and/or manually by authorized personnel fromworkstation(s) 338.

In some embodiments, exemplary location profile 600 identifies location601 of the camera for which the video data has been captured. Forexample, location 601 can identify “Exercise Yard” as the location ofthe camera. Exemplary location profile 600 can also include date/timeperiod 602 of the video data is associated with data element 608 thatprovides the date and time period for which video data in location 601has been captured. Video data can be segmented into predetermined timeperiods to decrease the size of video data that is stored in database336. For example, video data can be segmented into two hour blocks.

Identified inmates 603 in location profile 600 is associated with dataelement 609 that can list, for example, a first identified inmate 609A,a second identified inmate 609B, and a third identified inmate 609C, allthree of which, include, for example, the name of the identified inmate,a timestamp in which the identified inmate appears within the videodata, any behaviors associated with the inmate during the timestamp(e.g., fight), as well as a video clip spanning the timestamp in whichthe identified inmate appears. First identified inmate 609A, a secondidentified inmate 609B, and third identified inmate 609C also can beinclude additional information that can be extracted from video dataincluding a screenshot of the identified inmate. Video clips aregenerated by clip generator 332 of monitoring system 300. Audio data,which can be provided by microphones if available, can also be linked tolocation profile 600 and can include an audio clip of the incident.Audio clips can be generated by audio analysis subsystem 340 ofmonitoring system 300. Location profile 600 can store the actual files(e.g., the actual image, actual video clip file, or actual audio file)or can contain a pointer to the files stored in a separate location. Inexemplary data element 609, location profile 600 identifies inmates JohnE. and John F. as being involved in a fight. Behaviors are identifiedbased on behavior analysis module 326 in monitoring system 300.

Identified objects 604 in location profile 600 is associated with dataelement 610 that can list, for example, a first identified object 610A,a second identified object 610B, and a third identified object 610C, allthree of which, include, for example, the name of the identified object,a timestamp in which the identified object appears within the videodata, any other data associated with the identified object (e.g., aserial number, an inmate associated with the object), as well as a videoclip spanning the timestamp and/or screenshot in which the identifiedobject appears, and/or an audio clip if available.

Identified behavior 605 in location profile 600 is associated with dataelement 611 that can list, for example, a first identified behavior thatincludes identification of the behavior (e.g., fight), a timestamp inwhich the identified behavior occurs within the video data, anyidentified inmates associated with the identified behavior, as well as avideo clip spanning the timestamp and/or screenshot in which theidentified behavior appears, and/or an audio clip if available.

Alerts 606 in location profile 600 is associated with data element 612that can list, for example, any alerts and the alert conditions thattriggered the alert message to be sent. Authorized personnel cancustomize alerts based on selected parameters a behavior (e.g., fight).Authorized personnel can also customize the information that istransmitted when the behavior is selected such as a timestamp in whichthe identified behavior occurs within the video data, any identifiedinmates associated with the identified behavior, as well as a video clipspanning the timestamp and/or screenshot in which the identifiedbehavior appears, and/or an audio clip if available.

Unidentified log 607 in location profile 600 is associated with dataelement 613 that can list, for example, any unidentified informationfrom video data and/or an audio clip if available. Monitoring system 300can place any objects from video data that does not meet a certainthreshold in unidentified log 607. For example, data element 613 canlist the possible candidates for an inmate that is identified in videodata as well as the percentages that did not meet the threshold foridentifying the inmate. Through workstation(s) 338, authorized personnelcan manually identify the inmate based on the list of candidatesidentified in data element 613.

Exemplary Inmate Tracking System Operation

Exemplary usage of inmate tracking system 100 and monitoring system 300in a controlled environment will be described with respect to FIGS. 7-10. The exemplary usage described in FIGS. 7-10 can be performed byprocessing logic that can comprise hardware (e.g., circuitry, dedicatedlogic, programmable logic, microcode, etc.), software (e.g.,instructions executing on a processing device), or a combinationthereof. For illustrative purposes, FIGS. 7-10 are described withrespect to FIGS. 1-6 but are not limited to these example embodiments.For example, FIGS. 7-10 are described with respect to monitoring system300.

FIG. 7 illustrates a flowchart diagram of a method 700 for analyzing andindexing video for use in the exemplary inmate tracking system of FIG. 1, according to embodiments of the present disclosure. Method 700 can beperformed by processing logic that can comprise hardware (e.g.,circuitry, dedicated logic, programmable logic, microcode, etc.),software (e.g., instructions executing on a processing device), or acombination thereof. It is to be appreciated that additional steps, suchas additional object recognition steps, may be performed. Moreover, notall steps may be needed to perform the disclosure provided herein.Further, some of the steps may be performed simultaneously, or in adifferent order than shown in FIG. 7 , as will be understood by a personof ordinary skill in the art. Some steps can be combined and performedas a single step. Method 700 can be performed by monitoring system 300in real-time upon receiving video data, on stored video data at therequest of authorized personnel, or on stored video data atpredetermined times of the day.

In 701, monitoring system 300 receives video from an external sourcesuch as real-time video streams from video cameras 102A-102C or archivedvideo data from database 336. In 702, monitoring system 300 performsobject detection of the received video. In some embodiments, objectdetection can be performed by object identification module 318 ofmonitoring system 300. Monitoring system 300 also determines the cameralocation of the received video such as detecting the camera identifierin the video information associated with the received video.

In 703, monitoring system 300 begins the objection identificationprocess to identify all objects including persons within the video data.In some embodiments, object identification can be performed by inmateidentification module 320 of monitoring system 300. In 704, in order toidentify persons in the video data, monitoring system 300 determineswhether any detected objects include facial data. In 705, if there is atleast one object identified as facial data, the detected facial data iscompared with facial data associated with inmate profiles. In someembodiments, 705 includes identifying employees of the controlledenvironment by, for example, searching employee profiles and comparingthe facial data from the video with facial data associated with employeeprofiles.

In 706, monitoring system 300 performs a logging function. If themonitoring system 300 identifies an inmate that matches the facial data,monitoring system 300 updates the inmate's profile with information ofthe video as described above with respect to inmate profile 500 in FIG.5 . In some embodiments, monitoring system 300 may employ a thresholdparameter during the facial recognition step in 705. For example, thefacial recognition of 705 may compare a number of facial data points inthe detected facial data with a number of facial data points from inmateprofiles. Monitoring system 300 may determine there is match when acertain percentage of the facial data points in the detected facial datameets a certain threshold of similarity with the facial data pointswithin an inmate profile. If monitoring system 300 does not locate aninmate profile having facial data that matches the detected facial datafrom the video data, monitoring system 300 may still log theidentification in a separate file, such as unidentified log 607, thatcan later be reviewed by authorized personnel.

In 707, monitoring system 300 determines whether any additional objectsin the video data have facial data that require performing facialrecognition. If so, monitoring system 300 repeats facial recognitionstep in 705. If not, monitoring system 300 continues with identifyingadditional objects. In 708, in order to identify persons in the videodata, monitoring system 300 determines whether any detected objectsinclude serial numbers. In 708, in some embodiments, monitoring system300 determines a list of candidate serial numbers detected in video. Thelist of candidate serial numbers can be determined based on analyzing anumber of image data points in the video data and using anotherthreshold parameter to identify potential numbers based on the analyzedimage data points. Monitoring system 300 may determine the candidateserial numbers when a certain percentage of the image data points meetsa certain threshold for identifying the data points as numbers.

In 709, if there is at least one object identified as a serial number ora number of candidate serial numbers, the detected serial number (orcandidate numbers) is compared with serial numbers associated withinmate profiles. In 709, monitoring system 300 may also utilize theresults of previous steps to increase the accuracy of matching the videodata to an inmate. For example, monitoring system 300 can use theresults of facial recognition in 705 in combination with the results ofserial number matching in 709 to identify the inmate. That is, if theresults of facial recognition in 705 and the results of serial numbermatching in 709 both identify the same inmate, the likelihood increasesthat the identification of the inmate is correct.

In 710, monitoring system 300 performs a logging function. If themonitoring system 300 identifies an inmate that matches the detectedserial number, monitoring system 300 updates the inmate's profile withinformation of the video as described above with respect to inmateprofile 500 in FIG. 5 . If monitoring system 300 does not locate aninmate profile having serial numbers that matches the detected serialnumbers from the video data, monitoring system 300 may still log theidentification in a separate file, such as unidentified log 607, thatcan later be reviewed by authorized personnel.

In 711, monitoring system 300 determines whether any additional objectsin the video data have serial numbers that require serial numbermatching. If so, monitoring system 300 repeats the serial numbermatching step in 709. If not, monitoring system 300 continues withidentifying additional objects. In 712, in order to identify persons inthe video data, monitoring system 300 determines whether any detectedobjects include additional identifying marks such as tattoos or scars.In 713, if there is at least one object identified as am additionalidentifying mark, the detected identifying mark is compared withidentifying marks associated with inmate profiles.

In 713, monitoring system 300 may also utilize the results of previoussteps to increase the accuracy of matching the video data to an inmate.For example, monitoring system 300 can use the results of facialrecognition in 705 and the results of serial number matching in 709 incombination with mark matching in 713 to identify the inmate. That is,if the results of facial recognition in 705, the results of serialnumber matching in 709, and the results of mark matching in 713 identifythe same inmate, the likelihood increases that the identification of theinmate is correct.

In 714, monitoring system 300 performs a logging function. If themonitoring system 300 identifies an inmate that matches the detectedmark, monitoring system 300 updates the inmate's profile withinformation of the video as described above with respect to inmateprofile 500 in FIG. 5 . If monitoring system 300 does not locate aninmate profile having serial numbers that matches the detected serialnumbers from the video data, monitoring system 300 may still log theidentification in a separate file, such as unidentified log 607, thatcan later be reviewed by authorized personnel. In 715, monitoring system300 determines whether any additional objects in the video data havemarks that require mark matching. If so, monitoring system 300 repeatsthe mark matching step in 713.

If not, in 716, any additional identification and recognition, such asidentifying inmates based on gait analysis, can be performed. The numberof identification and recognition steps can be configured by theadministrator. Reducing the number of steps increases the speed of therecognition process while increasing the number of steps increases theaccuracy of the recognition process. For example, monitoring system 300can reduce the number of false positives by analyzing an increase numberof available data points including audio data (discussed further in FIG.8 ), video data, and gait information. In 717, monitoring system 300performs a logging function based on if any additional information, suchas identification of the inmate based on gait, is recognized within thevideo data.

In 718, monitoring system 300 determines whether any alert conditionshave been triggered. In some embodiments, alert module 324 performs thedetermination based on the identification of the inmate performed byinmate identification module 320. Alert conditions include but are notlimited to detecting an inmate in a specific location or detectingmultiple inmates located near each other (e.g., within the same frame ofthe video). If alert module 324 determines that an alert condition istriggered based on the results of the previous steps, it sends anappropriate alert based on the parameters of the alert which include thepeople who are to receive the alert in 719.

FIG. 8 illustrates a flowchart diagram of a method for analyzing andindexing video and/or audio for use in the exemplary tracking system ofFIG. 1 , according to embodiments of the present disclosure. Method 800can be performed by processing logic that can comprise hardware (e.g.,circuitry, dedicated logic, programmable logic, microcode, etc.),software (e.g., instructions executing on a processing device), or acombination thereof. It is to be appreciated that additional steps, suchas additional object recognition steps, may be performed. Moreover, notall steps may be needed to perform the disclosure provided herein.Further, some of the steps may be performed simultaneously, or in adifferent order than shown in FIG. 8 , as will be understood by a personof ordinary skill in the art. Some steps can be combined and performedas a single step. Method 800 can be performed by monitoring system 300in real-time upon receiving video data and/or audio data, on storedvideo data at the request of authorized personnel, or on stored videodata at predetermined times of the day.

In 801, monitoring system 300 receives video and/or audio data from anexternal source such as real-time video and audio data streams fromvideo cameras 102A-102C, archived video and audio data from database336, and/or real-time audio data streams from standalone microphones213A-F. In 802, monitoring system 300 determines whether the receiveddata includes only video data. If yes, monitoring system 300 proceeds to702 of FIG. 7 as discussed above.

In 803, monitoring system 300 determines whether the received dataincludes video and audio data or just audio data. If both video andaudio data, monitoring system 300 proceeds to 804. In 804, monitoringsystem 300 determines the location of video cameras 207A-F and/orstandalone microphones 213A-F associated with the received video andaudio data. In 805, monitoring system 300 analyzes the video data.Examples of analyzing video data are discussed with respect to 703-716of FIG. 7 . In 806, monitoring system 300 next analyzes the audio data.Analyzing audio data includes performing voice recognition and ambientsound detection as discussed above with respect to audio analysissubsystem 340 in FIG. 3 . In 807, monitoring system 300 utilizes theresults of 805 and 806 to perform location detection and trackingfeatures of the claimed disclosures. For example, monitoring system 300can perform facial recognition of video data in 805 and audiorecognition in 806 to determine the identify of an inmate within thereceived data. Monitoring system 300 can then associate the identifiedinmate with the detected location of video camera and/or microphone thatprovided the data as determined in 804. Based on the identified inmateand the associated location, monitoring system 300 may determine thelocation of a specific inmate.

If just audio data, monitoring system 300 proceeds to 808. In 808,monitoring system 300 determines the location of standalone microphones213A-F associated with the received audio data. In 809, monitoringsystem 300 next analyzes the audio data which includes performing voicerecognition and ambient sound detection. In 810, audio analysissubsystem 340 of monitoring system 300 attempts to identify the inmate(or guards) associated with the analyzed audio data as discussed withrespect to FIG. 3 .

After performing video/audio analysis of 804-807 or audio analysis of808-809, monitoring system 300 logs the results of the analysis in 811.For example, monitoring system 300 can update an inmate profile of anidentified inmate with the video data, audio data, and the results ofthe analysis. In 812, monitoring system 300 determines whether any alertconditions have been triggered. In some embodiments, alert module 324performs the determination based on the identification of the inmateperformed by inmate identification module 320. Alert conditions includebut are not limited to detecting an inmate in a specific location ordetecting multiple inmates located near each other (e.g., within thesame frame of the video). If alert module 324 determines that an alertcondition is triggered based on the results of the previous steps, itsends an appropriate alert based on the parameters of the alert whichinclude the people who are to receive the alert in 813.

FIG. 9 illustrates a flowchart diagram of a method for processing searchrequests of video for use in the exemplary inmate tracking system ofFIG. 1 , according to embodiments of the present disclosure. Method 900can be performed by processing logic that can comprise hardware (e.g.,circuitry, dedicated logic, programmable logic, microcode, etc.),software (e.g., instructions executing on a processing device), or acombination thereof. It is to be appreciated that additional steps, suchas additional object recognition steps, may be performed. Moreover, notall steps may be needed to perform the disclosure provided herein.Further, some of the steps may be performed simultaneously, or in adifferent order than shown in FIG. 9 , as will be understood by a personof ordinary skill in the art. Some steps can be combined and performedas a single step. Method 900 can be performed by monitoring system 300in real-time upon receiving video data, on stored video data at therequest of authorized personnel, or on stored video data atpredetermined times of the day.

In 901, monitoring system 300 receives a search request. The searchrequest can be transmitted by authorized personnel of controlledenvironment 101 such as through any of mobile devices 104A-104B andworkstations 111-112. For example, specialized video retrieval andsearch applications can be installed on mobile devices 104A-104B andworkstations 111-112 that provide authorized personnel access to videodata and inmate profiles stored in database 336 of monitoring system300. The applications can be customized for the needs of controlledenvironment 101 and can allow for any number of search terms to be inputand form the basis of searching video data. Search requests may include,but are not limited to, searching for specific inmates by name, serialnumber, identifying marks, or a scanned image (e.g., a mug shot),searching for specific behaviors such as fights, and searching aspecific time duration within a specific location of controlledenvironment 101.

In 902, monitoring system 300 determines from the search request whetherto search real-time or archived video data. For example, the searchrequest may include a parameter that indicates the type of search to beperformed. Searching real-time or archived video data can be based onthe type of search request. For example, searches of past incidents ofbehaviors such as fights would involve searching archived video data.Similarly, searching a specific time duration with a specific locationcould also involves searching archived video data. For example,authorized personnel could want to confirm that an inmate was in thespecific location (e.g., video conference room 203) at a designatedtime. This information can be cross-referenced with a schedule toconfirm that the inmate was present in the specific location asexpected.

Real-time searches of real-time video data could be utilized todetermine the current location of an inmate. A real-time search wouldresult in monitoring system 300 performing video analysis on video dataas it is received from video cameras in the inmate tracking system 100in 903. In 904, monitoring system 300 performs real-time objectidentification of the monitored real-time video data which involvesidentifying inmates, objects, and behaviors from the real-time videodata. This involves comparing the search terms (e.g., inmate name) withany identified information with the real-time video data. If there is amatch, monitoring system 300 can identify and save the video thatincludes the requested search terms. In some embodiments, saving thevideo can include generating a video clip from the real-time video datawhere the video clip that spans a timestamp in which the requestedsearch terms appears within the real-time video data. In 908, monitoringsystem 300 can return the video to workstation(s) 338.

Searches of archived video data would result in searching archived videodata in 906. Information from archived video data may already have beenindexed into inmate and/or location profiles. Accordingly, searchingarchived video includes searching information or metadata of inmateand/or location profiles. In 907, any video such as video clips thatmatch the search terms of the search request. In 908, monitoring system300 can return the video to workstation(s) 338.

FIG. 10 illustrates a flowchart diagram of a method for analyzing videoand detecting certain behaviors for use in the exemplary inmate trackingsystem of FIG. 1 , according to embodiments of the present disclosure.Method 1000 can be performed by processing logic that can comprisehardware (e.g., circuitry, dedicated logic, programmable logic,microcode, etc.), software (e.g., instructions executing on a processingdevice), or a combination thereof. It is to be appreciated thatadditional steps, such as additional object recognition steps, may beperformed. Moreover, not all steps may be needed to perform thedisclosure provided herein. Further, some of the steps may be performedsimultaneously, or in a different order than shown in FIG. 10 , as willbe understood by a person of ordinary skill in the art. Some steps canbe combined and performed as a single step. Method 1000 can be performedby monitoring system 300 in real-time upon receiving video data, onstored video data at the request of authorized personnel, or on storedvideo data at predetermined times of the day.

In 1001, monitoring system 300 receives video from an external sourcesuch as real-time video streams from video cameras 102A-102C or archivedvideo data from database 336. In 1002, monitoring system 300 detects anybehavior in the received video. Examples of behavior that are to bedetected include fights, suicide attempts, and threatening behavior byinmates. In some embodiments, behavior detection can be initiallyperformed by object identification module 318 of monitoring system 300.Object identification module 318 can provide the video data to behavioranalysis 326 for behavior identification.

In 1003, behavior analysis 326 can include employ behavior algorithmsfor identifying the behaviors. For example, behavior analysis 326 candetermine that an inmate has raised both of this arms above his headwithin his cell. The location of the inmate is determined by, forexample, determining the location of the camera that provided the videofeed. Behavior analysis 326 would identify such an action as a suicideattempt (e.g., attempting to fashion a noose above the inmate's head).As another example, behavior analysis 326 can determine that a fight maybe imminent or occurring based on a count of inmates identified withinthe video data.

In 1004, monitoring system 300 can determine whether to send an alertbased on the determined behavior. As previously discussed, authorizedpersonnel can establish alert conditions that trigger alerts such as thedetection of a suicide attempt or a fight. In 1005, monitoring system300 sends the alert if alert conditions are met by the detected andidentified behavior. In 1006, monitoring system 300 performs a loggingfunction based on if any additional information, such as identificationof the inmate based on gait, is recognized within the video data.

Exemplary Computer Implementation

It will be apparent to persons skilled in the relevant art(s) thatvarious elements and features of the present disclosure, as describedherein, can be implemented in hardware using analog and/or digitalcircuits, in software, through the execution of computer instructions byone or more general purpose or special-purpose processors, or as acombination of hardware and software.

The following description of a general purpose computer system isprovided for the sake of completeness. Embodiments of the presentdisclosure can be implemented in hardware, or as a combination ofsoftware and hardware. Consequently, embodiments of the disclosure maybe implemented in the environment of a computer system or otherprocessing system. For example, the methods of FIGS. 7-9 can beimplemented in the environment of one or more computer systems or otherprocessing systems. An example of such a computer system 1100 is shownin FIG. 11 . One or more of the modules depicted in the previous figurescan be at least partially implemented on one or more distinct computersystems 1100.

Computer system 1100 includes one or more processors, such as processor1104. Processor 1104 can be a special purpose or a general purposedigital signal processor. Processor 1104 is connected to a communicationinfrastructure 1102 (for example, a bus or network). Various softwareimplementations are described in terms of this exemplary computersystem. After reading this description, it will become apparent to aperson skilled in the relevant art(s) how to implement the disclosureusing other computer systems and/or computer architectures.

Computer system 1100 also includes a main memory 1106, preferably randomaccess memory (RAM), and may also include a secondary memory 1108.Secondary memory 1108 may include, for example, a hard disk drive 1110and/or a removable storage drive 1112, representing a floppy disk drive,a magnetic tape drive, an optical disk drive, or the like. Removablestorage drive 1112 reads from and/or writes to a removable storage unit1116 in a well-known manner. Removable storage unit 1116 represents afloppy disk, magnetic tape, optical disk, or the like, which is read byand written to by removable storage drive 1112. As will be appreciatedby persons skilled in the relevant art(s), removable storage unit 1116includes a computer usable storage medium having stored therein computersoftware and/or data.

In alternative implementations, secondary memory 1108 may include othersimilar means for allowing computer programs or other instructions to beloaded into computer system 1100. Such means may include, for example, aremovable storage unit 1118 and an interface 1114. Examples of suchmeans may include a program cartridge and cartridge interface (such asthat found in video game devices), a removable memory chip (such as anEPROM, or PROM) and associated socket, a thumb drive and USB port, andother removable storage units 1118 and interfaces 1114 which allowsoftware and data to be transferred from removable storage unit 1118 tocomputer system 1100.

Computer system 1100 may also include a communications interface 1120.Communications interface 1120 allows software and data to be transferredbetween computer system 1100 and external devices. Examples ofcommunications interface 1120 may include a modem, a network interface(such as an Ethernet card), a communications port, a PCMCIA slot andcard, etc. Software and data transferred via communications interface1120 are in the form of signals which may be electronic,electromagnetic, optical, or other signals capable of being received bycommunications interface 1120. These signals are provided tocommunications interface 1120 via a communications path 1122.Communications path 1122 carries signals and may be implemented usingwire or cable, fiber optics, a phone line, a cellular phone link, an RFlink and other communications channels.

As used herein, the terms “computer program medium” and “computerreadable medium” are used to generally refer to tangible storage mediasuch as removable storage units 1116 and 1118 or a hard disk installedin hard disk drive 1110. These computer program products are means forproviding software to computer system 1100.

Computer programs (also called computer control logic) are stored inmain memory 1106 and/or secondary memory 1108. Computer programs mayalso be received via communications interface 1120. Such computerprograms, when executed, enable the computer system 1100 to implementthe present disclosure as discussed herein. In particular, the computerprograms, when executed, enable processor 1104 to implement theprocesses of the present disclosure, such as any of the methodsdescribed herein. Accordingly, such computer programs representcontrollers of the computer system 1100. Where the disclosure isimplemented using software, the software may be stored in a computerprogram product and loaded into computer system 1100 using removablestorage drive 1112, interface 1114, or communications interface 1120.

In another embodiment, features of the disclosure are implementedprimarily in hardware using, for example, hardware components such asapplication-specific integrated circuits (ASICs) and gate arrays.Implementation of a hardware state machine so as to perform thefunctions described herein will also be apparent to persons skilled inthe relevant art(s).

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The disclosure has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the disclosure should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

1. (canceled)
 2. A method for tracking an inmate within a controlledenvironment, comprising: receiving, by a monitoring system, a video,wherein the video is provided by at least one video camera within thecontrolled environment; and performing, by the monitoring system,behavior identification of the video, wherein the behavioridentification comprises: utilizing a behavior analysis algorithm todetect an action being performed in the video; retrieving, from alocation profile, location information that indicates a physicallocation of the at least one video camera in a defined area within thecontrolled environment; determining a location of the video based atleast in part on the retrieved location information; determining atrigger condition based on the detected action; and generating an alertbased on the trigger condition, wherein the alert includes the locationof the video.
 3. The method of claim 2, wherein the behavioridentification further comprises: performing an identification of theinmate in the video; retrieving an inmate profile based on theidentification of the inmate; updating an inmate location history in theinmate profile by associating the inmate profile with the location ofthe video.
 4. The method of claim 3, wherein the identification of theinmate is based on a gait analysis of the video.
 5. The method of claim2, further comprising: determining a category of behavior based on thedetected action, wherein the trigger condition is associated with thecategory of behavior.
 6. The method of claim 5, wherein the category ofbehavior includes at least one of a prohibited behavior and a permittedbehavior.
 7. The method of claim 6, wherein the prohibited behaviorincludes a suicide attempt or a fight.
 8. The method of claim 2, whereinthe video is received in real-time and the behavior identification ofthe video is performed in real-time.
 9. The method of claim 2, whereinthe behavior identification further comprises: detecting at least oneother inmate in the video; and determining a number of inmates in thevideo based on the detecting, wherein the trigger condition is furtherbased on the number of inmates in the video.
 10. A monitoring system fortracking an inmate within a controlled environment, comprising: amemory; and a processor coupled to the memory and configured to:receiving, by a monitoring system, a video, wherein the video isprovided by at least one video camera within the controlled environment;and performing, by the monitoring system, behavior identification of thevideo, wherein the behavior identification comprises: utilizing abehavior analysis algorithm to detect an action being performed in thevideo; retrieving, from a location profile, location information thatindicates a physical location of the at least one video camera in adefined area within the controlled environment; determining a locationof the video based at least in part on the retrieved locationinformation; determining a trigger condition based on the detectedaction; and generating an alert based on the trigger condition, whereinthe alert includes the location of the video.
 11. The monitoring systemof claim 10, wherein the behavior identification further comprises:performing an identification of the inmate in the video; retrieving aninmate profile based on the identification of the inmate; updating aninmate location history in the inmate profile by associating the inmateprofile with the location of the video.
 12. The monitoring system ofclaim 11, wherein the identification of the inmate is based onperforming a gait analysis of the video.
 13. The monitoring system ofclaim 10, wherein the behavior identification further comprises:determining a category of behavior based on the detected action, whereinthe trigger condition is associated with the category of behavior. 14.The monitoring system of claim 13, wherein the category of behaviorincludes at least one of a prohibited behavior and a permitted behavior.15. The monitoring system of claim 14, wherein the prohibited behaviorincludes a suicide attempt or a fight.
 16. The monitoring system ofclaim 10, wherein the video is received in real-time and the behavioridentification of the video is performed in real-time.
 17. Anon-transitory computer-readable medium having instructions storedtherein, which when executed by a processor in a wireless device, causethe processor to perform operations for tracking an inmate within acontrolled environment, the operations comprising: receiving, by amonitoring system, a video, wherein the video is provided by at leastone video camera within the controlled environment; and performing, bythe monitoring system, behavior identification of the video, wherein thebehavior identification comprises: utilizing a behavior analysisalgorithm to detect an action being performed in the video; retrieving,from a location profile, location information that indicates a physicallocation of the at least one video camera in a defined area within thecontrolled environment; determining a location of the video based atleast in part on the retrieved location information; determining atrigger condition based on the detected action; and generating an alertbased on the trigger condition, wherein the alert includes the locationof the video.
 18. The non-transitory computer-readable medium of claim17, wherein the behavior identification further comprises: performing anidentification of the inmate in the video; retrieving an inmate profilebased on the identification of the inmate; updating an inmate locationhistory in the inmate profile by associating the inmate profile with thelocation of the video.
 19. The non-transitory computer-readable mediumof claim 18, wherein the identification of the inmate is based onperforming a gait analysis of the video.
 20. The non-transitorycomputer-readable medium of claim 17, wherein the behavioridentification further comprises: determining a category of behaviorbased on the detected action, wherein the trigger condition isassociated with the category of behavior.
 21. The non-transitorycomputer-readable medium of claim 20, wherein the category of behaviorincludes at least one of a prohibited behavior and a permitted behavior.