throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111
`US009083 850B 1
`
`c12) United States Patent
`Higgs
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,083,850 Bl
`Jul. 14, 2015
`
`(54) VIDEO BLURRING IN A SECURE
`ENVIRONMENT
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`(71) Applicant: Securus Technologies, Inc., Dallas, TX
`(US)
`
`(72)
`
`Inventor: Joseph Higgs, Fort Worth, TX (US)
`
`(73) Assignee: Securus Technologies, Inc., Dallas, TX
`(US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 91 days.
`
`(21) Appl. No.: 13/931,857
`
`(22)
`
`Filed:
`
`Jun.29,2013
`
`(51)
`
`(2006.01)
`(2006.01)
`
`Int. Cl.
`H04N7114
`H04N7115
`(52) U.S. Cl.
`CPC ..................................... H04N 71157 (2013.01)
`(58) Field of Classification Search
`CPC ...................................................... H04N 7/157
`USPC ......... 345/419; 348/51,217.1,241,586,625,
`348/14.07; 370/240; 382/103, 254, 255,
`382/118, 181; 396/133; 600/175, 587;
`713/176; 726/33
`See application file for complete search history.
`
`6,646,687 B1* 1112003 Vlahos .......................... 348/586
`6,801,642 B2 * 10/2004 Gorday eta!. ................ 382/118
`7,027,659 B1*
`4/2006 Thomas ........................ 382/254
`7,092,568 B2 *
`8/2006 Eaton ............................ 382/181
`7,316,032 B2 *
`1/2008 Tayebi eta!. ................... 705/51
`7,428,639 B2 *
`9/2008 Demos .......................... 713/176
`7,556,599 B2 *
`7/2009 Rovegno ....................... 600/175
`7,562,397 B1*
`7/2009 Mithal eta!. .................... 726/33
`7,657,171 B2 *
`212010 Sundstrom .................... 396/133
`7,783,075 B2 *
`8/2010 Zhang et al. .................. 382/103
`8,106,954 B2 *
`112012 Sato et al. .................. 348/217.1
`8,270,303 B2 *
`9/2012 Sauerwein et a!.
`........... 370/240
`8,319,898 B2 * 1112012 Ueno et al. .................... 348/625
`8,488,896 B2 *
`7/2013 Shi eta!. . ...................... 382/255
`2010/0085351 A1 *
`4/2010 Debet a!. ...................... 345/419
`2012/0249843 A1 * 10/2012 Hayashi ........................ 348/241
`2013/0033586 A1 *
`212013 Hulyalkar ....................... 348/51
`2013/0226037 A1 *
`8/2013 Pinto eta!. .................... 600/587
`* cited by examiner
`Primary Examiner- Gerald Gauthier
`(74) Attorney, Agent, or Firm- Fogarty, L.L.C.
`ABSTRACT
`(57)
`Methods and systems for video blurring in a secure environ(cid:173)
`ment are described. In one embodiment, the method includes
`receiving video at a video visitation device in a secure envi(cid:173)
`ronment, adjusting a depth of field parameter for the video,
`such that an image of a first object at a first distance from the
`video visitation device is in focus and an image of a second
`object at a second distance from the video visitation device is
`blurred, and providing the video to a viewing device located
`outside of the secure environment.
`21 Claims, 5 Drawing Sheets
`
`800
`~
`
`( START )
`t
`RECEIVE VIDEO FROM A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`STORE THE VIDEO RECEIVED FROM THE VIDEO
`VISITATION DEVICE IN A DATA STORAGE DEVICE
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`803 . / DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`801
`
`802 '-
`
`804
`
`GTL 1001
`
`

`
`103a
`
`103b
`
`103N
`
`0
`
`0
`
`102
`
`~~
`
`gggo~
`
`00000
`
`CONTROLLED-
`ENVIRONMENT
`FACILITY
`COMMUNICATION
`PROCESSING
`SYSTEM
`101
`
`104
`
`116
`
`AMS
`
`L115J
`
`FIG. 1
`
`109
`
`103d
`
`VISITATION
`SYSTEM
`
`,,
`e-¢-e
`0
`113 0
`
`112
`
`~
`
`= :-....
`~ ...
`....
`
`N
`0
`
`Ul
`
`('D
`
`rFJ =-('D
`.....
`....
`.....
`0
`Ul
`
`0
`
`0
`
`d
`rJl
`
`Oo
`
`\C = 00 w
`u. = = """"'
`
`

`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 2 of 5
`
`US 9,083,850 Bl
`
`103
`~
`
`201
`
`206
`
`200
`
`204
`
`FIG. 2
`
`

`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 3 of 5
`
`US 9,083,850 Bl
`
`205
`
`303b
`
`IMAGE
`SENSOR
`301
`
`.I
`
`FIG. 3
`
`130
`
`VISITATION SYSTEM
`401 '-- COMMUNICATION
`DEVICE
`
`IMAGE
`PROCESSOR
`
`~------~ ~------~
`
`V 402
`
`--
`403 ~ DATASTORAGE
`._
`DEVICE
`
`CAMERA
`CONTROLLER
`
`I'- 404
`
`FIG. 4
`
`103
`I
`
`VIDEO VISITATION DEVICE
`
`COMMUNICATION
`DEVICE
`501
`-
`
`CAMERA CONTROL
`
`LENS CONTROL
`505~ 507
`566
`\
`APERTURE
`CONTROL
`
`FIG. 5
`
`

`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 4 of 5
`
`US 9,083,850 Bl
`
`.
`FIG 6
`COMPUTER SYSTEM
`
`600
`\
`601A
`6018
`\
`\
`PROCESSOR I I PROCESSOR
`t
`t
`
`603
`\
`BUS
`
`0 0 0
`
`t
`
`NETWORK
`INTERFACE
`604
`-
`
`601N
`;
`I PROCESSOR
`
`t
`
`1/0
`CONTROLLER(S)
`605
`-
`
`CAMERA
`205
`-
`
`KEYBOARD
`607
`-
`
`CURSOR
`CONTROL
`606
`-
`
`DISPLAY(S)
`608
`-
`
`FIG. 9
`
`900
`
`t
`
`MEMORY
`
`DATA
`STORAGE
`I
`610
`
`PROGRAM
`INSTRUCTIONS
`I
`609
`
`sO:
`
`901
`
`902
`
`~~
`903---- -B..,_
`
`v
`
`\
`I
`I
`I
`II
`I
`II
`II J
`
`'-(
`I
`I
`I
`I
`I 11
`,J.-+--.,. __ Jl-.j
`\
`r/
`'(4
`~
`foJ
`II
`I
`J
`J
`II
`I
`II
`1
`I
`II 1
`I
`I
`I
`II
`II
`I
`I
`1
`II
`I
`J\~
`Q' ---'
`
`

`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 5 of 5
`
`US 9,083,850 Bl
`
`701 '--
`
`702
`
`703 _/
`
`RECEIVE VIDEO AT A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`'-- DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`700
`~
`
`( START )
`
`'
`
`)
`
`FIG. 7
`
`801 '--
`
`802 '--
`
`804 _/
`
`RECEIVE VIDEO FROM A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`STORE THE VIDEO RECEIVED FROM THE VIDEO
`VISITATION DEVICE IN A DATA STORAGE DEVICE
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`803 _/ DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`800
`~
`
`( START )
`
`'
`
`)
`
`FIG. 8
`
`

`
`US 9,083,850 Bl
`
`1
`VIDEO BLURRING IN A SECURE
`ENVIRONMENT
`
`BACKGROUND
`
`The introduction of video services into inmate housing and
`common area locations for the purposes of video visitation
`and/or video calling has introduced an unanticipated issue
`related to what details are conveyed through the video to
`whoever is viewing it at the other end. Inmate housing envi(cid:173)
`ronments simply were not designed with the expectation that
`those outside the facility would have a camera inside the
`housing units. As such, back ground details could include
`showers, bathrooms, interiors of cells, or just the general
`population going about their day. Additionally, other inmates
`who know they are on camera often act up and cause disrup(cid:173)
`tions which can escalate and become safety issues.
`In prior systems, the camera component of the video visi(cid:173)
`tation/call system reveals more than is intended and much
`more than is desired. A means of not showing what is hap(cid:173)
`pening behind inmates participating in video visitations/calls
`is needed in order to safe guard the privacy and promote the
`safe use of video services provided within inmate housing
`areas.
`Given the infancy of the use of video services within the
`correctional institution setting, previous methods of resolv(cid:173)
`ing the issue resorted to placing the video terminals outside of
`the general inmate population. This is undesirable as it
`negates one of the prime advantages of video visitations;
`namely, to provide visitations without having the security and
`administrative issues associated with moving inmates from
`housing locations to visitation locations.
`One alternative solution is to design the housing units in
`such a way that the video terminals face an innocent area. This
`is impractical since most correctional institutions were con(cid:173)
`structed decades before and reconstruction would be too
`costly. Also, such floor plan designs will tend to rely on
`designing "nooks" to house the video services but such
`"nooks" are difficult for correctional officers to monitor and
`thus provide locations for violent and/or illicit activities to
`take place.
`One previous technology uses facial recognition to "lock
`in" on the facial features of the inmate and blur everything but
`those features. This approach suffers as the inmate moves
`around and has the disadvantage of blurring much of the face
`and or torso of the inmate thus leading to an unsatisfactory
`visitation experience.
`
`SUMMARY
`
`Methods and systems for video blurring in a secure envi(cid:173)
`ronment are described. In one embodiment, the method
`includes receiving video at a video visitation device in a
`secure environment, adjusting a depth of field parameter for
`the video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, and providing the video to a viewing device
`located outside of the secure environment.
`In on embodiment, adjusting the depth of field parameter
`may include adjusting an f-stop setting of a camera associated
`with the video visitation device. Adjusting the f-stop setting
`may further include adjusting a focal length of a lens coupled
`to the video visitation device. In an embodiment, adjusting 65
`the f-stop setting includes adjusting an aperture setting of the
`camera associated with the video visitation device.
`
`25
`
`2
`In another embodiment, adjusting the depth of field param(cid:173)
`eter includes digitally processing the video received from the
`video visitation device in a video processing device to blur
`one or more objects at the second distance from the video
`visitation device.
`In one embodiment, adjusting the depth of field parameter
`is remotely controllable by a third party. Additionally, the
`method may include providing the video to a second viewing
`device for security monitoring, the second viewing device
`10 being associated with a remote control device configured to
`allow the third party monitor to remotely control the depth of
`field parameter.
`Various embodiments of tangible computer readable media
`15 are described. In one embodiment, the computer readable
`media comprises computer-readable code for receiving video
`from a video visitation device in a secure environment, stor(cid:173)
`ing the video received from the video visitation device in a
`data storage device, adjusting a depth of field parameter for
`20 the video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, and providing the adjusted video to a view-
`ing device located outside of the secure environment.
`In one embodiment, adjusting the depth of field parameter
`further comprises processing the video received from the
`video visitation device in a video processing device to blur
`one or more objects at the second distance from the video
`visitation device. Adjusting the depth of field parameter may
`30 be remotely controllable by a third-party monitor.
`The operations performed may further include providing
`the video to a second viewing device for security monitoring,
`the second viewing device being associated with a remote
`35 control device configured to allow the third-party monitor to
`remotely control the depth of field parameter. In an embodi(cid:173)
`ment, the operations include providing the video stored in the
`data storage device to an investigator in response to indicia
`from the third-party monitor. In still further embodiments, the
`40 operations include providing the video stored in the data
`storage device to an investigator in response to a request from
`the investigator.
`Embodiments of systems are also described. One embodi(cid:173)
`ment of a system includes a data communication device con-
`45 figured to receive video from a video visitation device in a
`secure environment. The system may also include a data
`storage device coupled to the data communication device and
`configured to store the video received from the video visita(cid:173)
`tion device. Additionally, the system may include a data pro-
`50 cessor configured to adjust a depth of field parameter for the
`video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, wherein the data communication device is
`55 configured to provide the video to a viewing device located
`outside of the secure environment.
`In an embodiment, the system includes a camera controller
`configured to adjust an f-stop setting of a camera associated
`with the video visitation device. The camera controller may
`60 be controllable by a third-party to remotely adjust the f-stop
`setting. Additionally, the camera controller may be config(cid:173)
`ured to adjust a focal length of a lens coupled to the video
`visitation device. In an embodiment, the camera controller is
`further configured to adjust an aperture setting of the camera
`associated with the video visitation device.
`In one embodiment, the system includes a second viewing
`device for security monitoring, the second viewing device
`
`

`
`US 9,083,850 Bl
`
`3
`being associated with a remote control device configured to
`allow a third-party to remotely control the depth of field
`parameter.
`The data communication device may provide the video
`stored in the data storage device to an investigator in response
`to indicia from the third-party. In another embodiment, the
`system is configured to provide the video stored in the data
`storage device to an investigator in response to a request from
`the investigator.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Having thus described the invention in general terms, ref(cid:173)
`erence will now be made to the accompanying drawings,
`which are not necessarily drawn to scale, and wherein:
`FIG. 1 is a block diagram of an environment where a
`visitation system may be employed according to some
`embodiments.
`FIG. 2 is a diagram of a video visitation device according to
`some embodiments.
`FIG. 3 is a block diagram illustrating one embodiment of a
`video camera device for use in a video visitation system.
`FIG. 4 is a block diagram of an embodiment of a visitation
`system.
`FIG. 5 is a block diagram of an embodiment of a video
`visitation device.
`FIG. 6 is a block diagram of a computer system configured
`to implement various systems and methods described herein
`according to some embodiments.
`FIG. 7 is a flowchart of an embodiment of a method for
`video blurring in a secure environment.
`FIG. 8 is a flowchart of another embodiment method for
`video blurring in a secure environment.
`FIG. 9 is an illustrative drawing of one embodiment of a
`blurred video frame.
`
`DETAILED DESCRIPTION
`
`This specification discloses systems and methods for video
`blurring in a secure environment. Generally speaking, the
`various techniques described herein may find applicability in
`a wide variety of controlled-environment facilities. Examples
`of controlled-environment facilities may include correctional
`institutions or facilities (e.g., municipal jails, county jails,
`state prisons, federal prisons, military stockades, juvenile
`facilities, detention camps, home incarceration environ(cid:173)
`ments, etc.), healthcare facilities (e.g., hospitals, nursing
`homes, mental health facilities, rehabilitation clinics, such as
`drug and alcohol rehabilitation facilities, etc.), restricted liv(cid:173)
`ing quarters (e.g., hotels, resorts, camps, dormitories, bar(cid:173)
`racks, etc.), and the like. For convenience of explanation,
`various examples discussed herein are presented in the con(cid:173)
`text of correctional facilities. For instance, in some of the
`embodiments discussed below, a controlled-environment
`facility may be referred to as a jail or prison, and its residents
`may be referred to as residents, arrestees, detainees, or
`inmates. It should be understood, however, that the systems
`and methods described herein may be similarly applicable to
`other types of controlled-environment facilities and their
`respective residents (e.g., a hospital and its patients).
`Turning now to FIG. 1, a block diagram of an illustrative
`environment where a visitation system may be employed is
`depicted according to some embodiments. As shown, com(cid:173)
`munication processing system 101 may provide telephone
`services, videoconferencing, online chat, and other commu- 65
`nication services to a controlled-environment facility. For
`example, in some cases, communication system 101 may be
`
`4
`co-located with a controlled-environment facility. Alterna(cid:173)
`tively, communication system 101 may be centrally or
`remotely located with respect to one or more controlled(cid:173)
`environment facilities and/or may provide communication
`services to multiple controlled-environment facilities. More
`generally, however, it should be noted that communication
`system 101 may assume a variety of forms, and may be
`configured to serve a variety of facilities and/or users,
`whether within or outside of a controlled-environment facil-
`10 ity.
`In one embodiment, a hybrid system may be implemented.
`The hybrid system may include one or more centrally located
`components and one or more components that are located on
`the premises of the controlled facility. For example, a data
`15 storage may be located in an off-site cloud storage facility. In
`some embodiments, servers, security monitoring systems and
`other components described in further detail below may be
`located in a central or remote facility. In embodiments of a
`hybrid system, other components may be located within the
`20 controlled facility. For example, in some embodiments a
`video visitation device as described in FIGS. 2-3 may be
`located within the controlled facility. In certain embodiments,
`the inmates may be able to communicate using the video
`visitation devices with persons located outside of the con-
`25 trolled facility, wherein the person outside of the facility uses
`a desktop computer, tablet computer, or the like. In another
`embodiment, the inmate may communicate with a person
`located inside of the controlled facility such as a visitation
`area. In such an embodiment, but he inmate and the visitor
`30 may communicate using a video visitation device respec(cid:173)
`tively.
`In the context of a correctional facility, for instance,
`inmates may use video-enabled telephones 102 to access
`certain communication services. In some facilities, inmates
`35 may also use a personal computer wireless device 104 to
`access such services. For example, an inmate may initiate
`telephone services by lifting the receiver on telephone 102, at
`which time the inmate may be prompted to provide a personal
`identification number (PIN), other identifying information or
`40 biometrics. An interactive voice response (IVR) unit or inter(cid:173)
`active smart device which may use visual keys (touchscreen
`or the like) (not shown) may generate and play prompt or
`other messages to inmates on devices 102 and/or 104.
`Under the control of communication processing system
`45 101, devices 102 and 104 may be capable of connecting to a
`non-resident's (i.e., a person not committed to a controlled(cid:173)
`environment facility) telephone 106 or device 105 across a
`publicly switched telephone network (PSTN) 107. For
`example, telephone 106 may be located at a non-resident's
`50 home, inmate visitation center, etc. Switch 108 in communi(cid:173)
`cation processing system 101 may be used to connect calls
`across PSTN 107. Additionally or alternatively, the non-resi(cid:173)
`dent may be at telephone 109 or device 112, which is on an
`Integrated Services Digital Network (ISDN), Voice-over-IP
`55 (VoiP), or packet data network 110, such as, for example the
`Internet. Router 111 of communication system 101 is used to
`route data packets associated with a call connection to desti(cid:173)
`nation telephone 109.
`Video visitation devices 1 03a-n (each collectively referred
`60 to as "video visitation device 103") may have video confer(cid:173)
`encing capabilities to enable inmates to participate in video
`visitation sessions with non-residents of the correctional
`facility via video call, secure online chat, etc. For example, a
`non-resident party may have a personal or laptop computer
`113 with camera 114 (or a cell phone, tablet computer, etc.).
`In another embodiment, the non-residents may also use a
`separate set of video visitation devices 103c-m. In one
`
`

`
`US 9,083,850 Bl
`
`5
`embodiment, the non-resident may use a video visitation
`device 1 03c-m outside of the facility. In another embodiment,
`the non-resident may use a video visitation device 103c-m
`located in a secure area within the facility. A network con(cid:173)
`nection between the parties may be established and supported
`by an organization or commercial service that provides com(cid:173)
`puter services and software for use in telecommunications
`and/or VOIP, such as SKYPE® or by a propriety system.
`Additionally or alternatively, the correctional facility and/or
`the destination may use video conferencing equipment com(cid:173)
`patible with ITU H.323, H.320, H.264, and/or V.SO, or other
`suitable standards. Generally speaking, each video visitation
`device 103 may be disposed in a visitation area of the con(cid:173)
`trolled-environment facility. As noted above, there may be
`objects or persons in the environment of the video visitation
`which may be private or objectionable. For example, when an
`inmate is conducting a video visitation call, other inmates of
`the facility may exhibit objectionable behaviors in the back(cid:173)
`ground of the frame captured by the video visitation device
`103. For these and other reasons, the inventor hereof has
`developed various systems and methods of blurring video
`captured by the video visitation devices 103, as described in
`more detail in connection with FIGS. 2-6 below.
`In addition to providing certain visitation and communica(cid:173)
`tion operations, communication processing system 101 may
`attempt to ensure that an inmate's calls, video conferences,
`online chats, etc. are performed only with non-residents
`whose identities, devices, email addresses, phone numbers,
`etc. are listed in that inmate's Pre-Approved Contact (PAC)
`list. Each inmate's PAC list may be stored, for example, in
`database 115 maintained by an Administration and Manage(cid:173)
`ment System (AMS) 116. In addition to PAC list(s),AMS 116
`may also store inmate or resident profile data (RPD), as well
`as visitation rules applicable to each inmate. As an example,
`in the context of a correctional facility, database 115 may
`include information such as balances for inmate trust and
`calling accounts, trial schedule, conviction data, criminal
`record, sentencing data, such as time served, time remaining
`to be served, and release date, cell and cellmate assignments,
`inmate restrictions and warnings, commissary order history,
`telephone call history, call recordings, known or suspected
`gang or criminal affiliations, known or suspected affiliates,
`accomplices, or gang members; and any other information
`that may be relevant or useful to correctional facility staff to 45
`house and maintain inmates.
`In some embodiments, database 115 may also indicate a
`personalized level of lighting that should be provided to a
`particular inmate during the inmate's video visitation ses(cid:173)
`sions depending, for example, upon who the identit(ies) of the
`inmate and/or the non-resident. Such personalized lighting
`levels may be configured according to the facility's goals.
`Visitation system 130 may be configured to provide, sched(cid:173)
`ule, and manage visitation services to residents and non(cid:173)
`residents of a controlled-environment facility. To that end,
`visitation system 130 may be coupled to PSTN 107 and/or
`network 110 in a manner similar to communication process(cid:173)
`ing system 101 by also including one or more switches and/or
`routers (not shown). Accordingly, visitation system 130 may
`be configured to communicate with one or more residents of
`the controlled-environment facility via devices 102-104 and
`with one or more non-residents via devices 105, 106, 109,
`112, and/or 113. Although visitation system 130 is shown in
`FIG. 1 as being remotely located with respect to communi(cid:173)
`cation processing system 101 and the controlled-environment
`facility, in other cases visitation system 130 may be co-lo(cid:173)
`cated with the facility and/or integrated within system 101.
`
`6
`In some implementations, communication system 101 may
`be configured to perform video visitation monitoring opera(cid:173)
`tions configured to monitor and or record video visitations
`(e.g., as video files). In scenarios where communication sys(cid:173)
`tem 101 is located within the controlled-environment facility,
`it may have direct access to AMS 116. In other embodiments,
`however, communication system 101 may be located
`remotely with respect to the controlled-environment facility,
`and access to AMS 116 may be obtained via a computer
`10 network such as, for example Network 110.
`FIG. 2 is a diagram of a video visitation device 103. In
`some embodiments, device 103 may be implemented as a
`computer-based system such as described in connection with
`FIG. 4. As illustrated, device 103 includes display 204, cam-
`15 era 205, and handset 201 coupled to device 103 via wire 209.
`Display 204 may be any suitable electronic display such as,
`for example, a Liquid Crystal Display (LCD), a touchscreen
`display (e.g., resistive, capacitive, etc.), or the like, whereas
`camera 205 may be any suitable imaging device such as, for
`20 instance, a video camera or webcam equipped with Charge(cid:173)
`Coupled Devices (CCDs), Complementary Metal-Oxide(cid:173)
`Semiconductor (CMOS) active pixel sensors, etc. Handset
`201 may be similar to a traditional telephone handset includ(cid:173)
`ing an earpiece portion (with a speaker), a handle portion, and
`25 a mouthpiece portion (with a microphone).
`During a video visitation session, video visitation device
`103 may be configured to capture a video image of an inmate
`to be transmitted to a non-resident using camera 205, and to
`display a video image of the non-resident to the inmate using
`30 display 204. Video visitation device 103 may also be config(cid:173)
`ured to capture an audio signal from the inmate to be trans(cid:173)
`mitted to the non-resident using the mouthpiece portion of
`handset 201, and to provide an audio signal from the non(cid:173)
`resident to the inmate using the earpiece portion of handset
`35 201. Additionally or alternatively, audio received from the
`non-resident may be reproduced via loudspeaker 202, and
`audio provided by the inmate may be captured via micro(cid:173)
`phone 203. In some embodiments, handset holder or holster
`208 may be configured to allow a user to securely rest handset
`40 201 against device 103 (e.g., in its "off' position) when device
`103 is not in use. Furthermore, handset holder 208 may
`include a mechanical or electromechanical switch or sensor
`(not shown) that senses when handset 201 is not resting
`against it (e.g. in its "on" position).
`Video visitation device 103 may also include lighting
`device 206 and lighting sensor 207. In some embodiments,
`lighting device 206 may include one or more incandescent
`light sources (e.g., bulbs, lamps, etc.), fluorescent lamps,
`Compact Fluorescent Lamps (CFL), Cold Cathode Fluores-
`50 cent Lamps (CCFL), high-intensity discharge sources, Light(cid:173)
`Emitting Diodes (LEDs ), or the like. Additionally or alterna(cid:173)
`lighting device 206 may include one or more
`tively,
`adjustable lighting devices with variable intensity, brightness,
`luminance, color, tone, etc. Lighting or light sensor 207 may
`55 include one or more suitable sensors such as, for example,
`photoresistors, photodiodes, etc. In various implementations,
`camera 205 may serve as light sensor 207, and light sensor
`207 may be absent.
`Furthermore, it should be noted that, outside of correc-
`60 tiona! facilities, video visitation device 103 may assume the
`form of any computer, tablet computer, smart phone, etc., or
`any other consumer device or appliance with videoconferenc(cid:173)
`ing capabilities. For example, in the case where video visita(cid:173)
`tion device 103 is a camera-enabled television (or smart
`65 phone, etc.) that does not include a dedicated lightning appa(cid:173)
`ratus, the brightness of display 204 may be adjusted so that
`display 204 may itself act as lighting device 206 (e.g., the
`
`

`
`US 9,083,850 Bl
`
`7
`brightness of display 204 may be increased to also increase
`the illumination of the person( s) "watching" the teleconfer(cid:173)
`ence through the television, for example, upon detection that
`a video connection has been established).
`In the context of correctional facilities, video visitation
`device 103 may include one or more tampering/impact resis(cid:173)
`tant or hardened elements configured to protect them from
`vandalism or otherwise destructive acts. For example, one or
`more of devices 202-207 may be protected by a transparent
`plastic or thermoplastic (e.g., Plexiglas, etc.) material.
`In one embodiment, the video visitation device 103 may
`include a keypad 210 or other user input device to allow a user
`to enter information. For example, the user may dial a tele(cid:173)
`phone number associated with a recipient of a video visitation
`call, enter an account number for billing purposes, or enter a 15
`Personal Identification Number (PIN) or inmate number for
`authentication and/or identification purposes.
`FIG. 3 is a block diagram illustrating one embodiment of a
`video camera device 205 for use in a video visitation system
`103. In an embodiment, the video camera device 205 may 20
`include an image sensor 301. For example, the image sensor
`may be configured to capture a sequence of images suitable
`for generating video. One of ordinary skill will recognize that
`there are many different image sensors 301 which may be
`used according to the present embodiments, including 25
`Charge-Coupled Devices (CCDs) or Complimentary Metal(cid:173)
`Oxide-Semiconductor (CMOS) image sensors.
`In an embodiment, an arrangement of one or more lenses
`303 and/or an aperture mechanism 302 may be coupled to the
`image sensor 301. For example, a first lens 303a and a second 30
`lens 303b may be used to set a focal length of the camera
`device 205. The focal length may be adjusted by adjusting a
`distance between the first lens 303a and the second lens 303b.
`The aperture mechanism 302 may be adjusted to change the
`aperture through which light passes to the image sensor 301.
`The depth of field of the camera 205 may be adjusted by either
`changing the focal length by adjusting the lenses 303a,b or by
`adjusting the aperture size by adjusting the aperture mecha(cid:173)
`nism 302. In general, the ratio of the focal length set by the
`lenses 303a and/or 303b to the aperture size is referred to as
`the f-stop or relative aperture of the camera system 205. The
`depth of field is the distance between the nearest and farthest
`objects in a scene that appear acceptably sharp in an image.
`The depth of field may be manipulated by adjustment of the
`f-stop of the camera system 205 or through digital processing 45
`techniques.
`In such an embodiment, the depth of field of the camera
`system 205 may be adjusted such that a first object 304
`positioned at a first distance 306 from the image sensor 301
`may be in focus, while a second image 305 positioned at a 50
`second distance 307 or greater may be blurred. The lenses
`303a-b and/or the aperture mechanism 302 may be adjusted
`to increase or decrease the depth of field of the camera system
`such that both the first object 304 and the second object 305
`are in focus at a first setting, or such that only the first object 55
`304 is in focus at a second setting, or such that only the second
`object is in focus at a third setting.
`FIG. 4 is a block diagram of an embodiment of the visita(cid:173)
`tion system 130. In one embodiment, the visitation system
`130 may include a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket