`
`1111111111111111111111111111111111111111111111111111111111111
`US009083 850B 1
`
`c12) United States Patent
`Higgs
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,083,850 Bl
`Jul. 14, 2015
`
`(54) VIDEO BLURRING IN A SECURE
`ENVIRONMENT
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`(71) Applicant: Securus Technologies, Inc., Dallas, TX
`(US)
`
`(72)
`
`Inventor: Joseph Higgs, Fort Worth, TX (US)
`
`(73) Assignee: Securus Technologies, Inc., Dallas, TX
`(US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 91 days.
`
`(21) Appl. No.: 13/931,857
`
`(22)
`
`Filed:
`
`Jun.29,2013
`
`(51)
`
`(2006.01)
`(2006.01)
`
`Int. Cl.
`H04N7114
`H04N7115
`(52) U.S. Cl.
`CPC ..................................... H04N 71157 (2013.01)
`(58) Field of Classification Search
`CPC ...................................................... H04N 7/157
`USPC ......... 345/419; 348/51,217.1,241,586,625,
`348/14.07; 370/240; 382/103, 254, 255,
`382/118, 181; 396/133; 600/175, 587;
`713/176; 726/33
`See application file for complete search history.
`
`6,646,687 B1* 1112003 Vlahos .......................... 348/586
`6,801,642 B2 * 10/2004 Gorday eta!. ................ 382/118
`7,027,659 B1*
`4/2006 Thomas ........................ 382/254
`7,092,568 B2 *
`8/2006 Eaton ............................ 382/181
`7,316,032 B2 *
`1/2008 Tayebi eta!. ................... 705/51
`7,428,639 B2 *
`9/2008 Demos .......................... 713/176
`7,556,599 B2 *
`7/2009 Rovegno ....................... 600/175
`7,562,397 B1*
`7/2009 Mithal eta!. .................... 726/33
`7,657,171 B2 *
`212010 Sundstrom .................... 396/133
`7,783,075 B2 *
`8/2010 Zhang et al. .................. 382/103
`8,106,954 B2 *
`112012 Sato et al. .................. 348/217.1
`8,270,303 B2 *
`9/2012 Sauerwein et a!.
`........... 370/240
`8,319,898 B2 * 1112012 Ueno et al. .................... 348/625
`8,488,896 B2 *
`7/2013 Shi eta!. . ...................... 382/255
`2010/0085351 A1 *
`4/2010 Debet a!. ...................... 345/419
`2012/0249843 A1 * 10/2012 Hayashi ........................ 348/241
`2013/0033586 A1 *
`212013 Hulyalkar ....................... 348/51
`2013/0226037 A1 *
`8/2013 Pinto eta!. .................... 600/587
`* cited by examiner
`Primary Examiner- Gerald Gauthier
`(74) Attorney, Agent, or Firm- Fogarty, L.L.C.
`ABSTRACT
`(57)
`Methods and systems for video blurring in a secure environ(cid:173)
`ment are described. In one embodiment, the method includes
`receiving video at a video visitation device in a secure envi(cid:173)
`ronment, adjusting a depth of field parameter for the video,
`such that an image of a first object at a first distance from the
`video visitation device is in focus and an image of a second
`object at a second distance from the video visitation device is
`blurred, and providing the video to a viewing device located
`outside of the secure environment.
`21 Claims, 5 Drawing Sheets
`
`800
`~
`
`( START )
`t
`RECEIVE VIDEO FROM A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`STORE THE VIDEO RECEIVED FROM THE VIDEO
`VISITATION DEVICE IN A DATA STORAGE DEVICE
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`803 . / DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`801
`
`802 '-
`
`804
`
`GTL 1001
`
`
`
`103a
`
`103b
`
`103N
`
`0
`
`0
`
`102
`
`~~
`
`gggo~
`
`00000
`
`CONTROLLED-
`ENVIRONMENT
`FACILITY
`COMMUNICATION
`PROCESSING
`SYSTEM
`101
`
`104
`
`116
`
`AMS
`
`L115J
`
`FIG. 1
`
`109
`
`103d
`
`VISITATION
`SYSTEM
`
`,,
`e-¢-e
`0
`113 0
`
`112
`
`~
`
`= :-....
`~ ...
`....
`
`N
`0
`
`Ul
`
`('D
`
`rFJ =-('D
`.....
`....
`.....
`0
`Ul
`
`0
`
`0
`
`d
`rJl
`
`Oo
`
`\C = 00 w
`u. = = """"'
`
`
`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 2 of 5
`
`US 9,083,850 Bl
`
`103
`~
`
`201
`
`206
`
`200
`
`204
`
`FIG. 2
`
`
`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 3 of 5
`
`US 9,083,850 Bl
`
`205
`
`303b
`
`IMAGE
`SENSOR
`301
`
`.I
`
`FIG. 3
`
`130
`
`VISITATION SYSTEM
`401 '-- COMMUNICATION
`DEVICE
`
`IMAGE
`PROCESSOR
`
`~------~ ~------~
`
`V 402
`
`--
`403 ~ DATASTORAGE
`._
`DEVICE
`
`CAMERA
`CONTROLLER
`
`I'- 404
`
`FIG. 4
`
`103
`I
`
`VIDEO VISITATION DEVICE
`
`COMMUNICATION
`DEVICE
`501
`-
`
`CAMERA CONTROL
`
`LENS CONTROL
`505~ 507
`566
`\
`APERTURE
`CONTROL
`
`FIG. 5
`
`
`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 4 of 5
`
`US 9,083,850 Bl
`
`.
`FIG 6
`COMPUTER SYSTEM
`
`600
`\
`601A
`6018
`\
`\
`PROCESSOR I I PROCESSOR
`t
`t
`
`603
`\
`BUS
`
`0 0 0
`
`t
`
`NETWORK
`INTERFACE
`604
`-
`
`601N
`;
`I PROCESSOR
`
`t
`
`1/0
`CONTROLLER(S)
`605
`-
`
`CAMERA
`205
`-
`
`KEYBOARD
`607
`-
`
`CURSOR
`CONTROL
`606
`-
`
`DISPLAY(S)
`608
`-
`
`FIG. 9
`
`900
`
`t
`
`MEMORY
`
`DATA
`STORAGE
`I
`610
`
`PROGRAM
`INSTRUCTIONS
`I
`609
`
`sO:
`
`901
`
`902
`
`~~
`903---- -B..,_
`
`v
`
`\
`I
`I
`I
`II
`I
`II
`II J
`
`'-(
`I
`I
`I
`I
`I 11
`,J.-+--.,. __ Jl-.j
`\
`r/
`'(4
`~
`foJ
`II
`I
`J
`J
`II
`I
`II
`1
`I
`II 1
`I
`I
`I
`II
`II
`I
`I
`1
`II
`I
`J\~
`Q' ---'
`
`
`
`U.S. Patent
`
`Jul. 14, 2015
`
`Sheet 5 of 5
`
`US 9,083,850 Bl
`
`701 '--
`
`702
`
`703 _/
`
`RECEIVE VIDEO AT A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`'-- DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`700
`~
`
`( START )
`
`'
`
`)
`
`FIG. 7
`
`801 '--
`
`802 '--
`
`804 _/
`
`RECEIVE VIDEO FROM A VIDEO VISITATION
`DEVICE IN A SECURE ENVIRONMENT
`t
`STORE THE VIDEO RECEIVED FROM THE VIDEO
`VISITATION DEVICE IN A DATA STORAGE DEVICE
`t
`ADJUST A DEPTH-OF-FIELD PARAMETER FOR THE VIDEO,
`SUCH THAT AN IMAGE OF A FIRST OBJECT AT A FIRST
`803 _/ DISTANCE FROM THE VIDEO VISITATION DEVICE IS IN FOCUS
`AND AN IMAGE OF A SECOND OBJECT AT A SECOND
`DISTANCE FROM THE VIDEO VISITATION DEVICE IS BLURRED
`t
`PROVIDING THE VIDEO TO A VIEWING DEVICE
`LOCATED OUTSIDE OF THE SECURE ENVIRONMENT
`t
`( END
`
`800
`~
`
`( START )
`
`'
`
`)
`
`FIG. 8
`
`
`
`US 9,083,850 Bl
`
`1
`VIDEO BLURRING IN A SECURE
`ENVIRONMENT
`
`BACKGROUND
`
`The introduction of video services into inmate housing and
`common area locations for the purposes of video visitation
`and/or video calling has introduced an unanticipated issue
`related to what details are conveyed through the video to
`whoever is viewing it at the other end. Inmate housing envi(cid:173)
`ronments simply were not designed with the expectation that
`those outside the facility would have a camera inside the
`housing units. As such, back ground details could include
`showers, bathrooms, interiors of cells, or just the general
`population going about their day. Additionally, other inmates
`who know they are on camera often act up and cause disrup(cid:173)
`tions which can escalate and become safety issues.
`In prior systems, the camera component of the video visi(cid:173)
`tation/call system reveals more than is intended and much
`more than is desired. A means of not showing what is hap(cid:173)
`pening behind inmates participating in video visitations/calls
`is needed in order to safe guard the privacy and promote the
`safe use of video services provided within inmate housing
`areas.
`Given the infancy of the use of video services within the
`correctional institution setting, previous methods of resolv(cid:173)
`ing the issue resorted to placing the video terminals outside of
`the general inmate population. This is undesirable as it
`negates one of the prime advantages of video visitations;
`namely, to provide visitations without having the security and
`administrative issues associated with moving inmates from
`housing locations to visitation locations.
`One alternative solution is to design the housing units in
`such a way that the video terminals face an innocent area. This
`is impractical since most correctional institutions were con(cid:173)
`structed decades before and reconstruction would be too
`costly. Also, such floor plan designs will tend to rely on
`designing "nooks" to house the video services but such
`"nooks" are difficult for correctional officers to monitor and
`thus provide locations for violent and/or illicit activities to
`take place.
`One previous technology uses facial recognition to "lock
`in" on the facial features of the inmate and blur everything but
`those features. This approach suffers as the inmate moves
`around and has the disadvantage of blurring much of the face
`and or torso of the inmate thus leading to an unsatisfactory
`visitation experience.
`
`SUMMARY
`
`Methods and systems for video blurring in a secure envi(cid:173)
`ronment are described. In one embodiment, the method
`includes receiving video at a video visitation device in a
`secure environment, adjusting a depth of field parameter for
`the video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, and providing the video to a viewing device
`located outside of the secure environment.
`In on embodiment, adjusting the depth of field parameter
`may include adjusting an f-stop setting of a camera associated
`with the video visitation device. Adjusting the f-stop setting
`may further include adjusting a focal length of a lens coupled
`to the video visitation device. In an embodiment, adjusting 65
`the f-stop setting includes adjusting an aperture setting of the
`camera associated with the video visitation device.
`
`25
`
`2
`In another embodiment, adjusting the depth of field param(cid:173)
`eter includes digitally processing the video received from the
`video visitation device in a video processing device to blur
`one or more objects at the second distance from the video
`visitation device.
`In one embodiment, adjusting the depth of field parameter
`is remotely controllable by a third party. Additionally, the
`method may include providing the video to a second viewing
`device for security monitoring, the second viewing device
`10 being associated with a remote control device configured to
`allow the third party monitor to remotely control the depth of
`field parameter.
`Various embodiments of tangible computer readable media
`15 are described. In one embodiment, the computer readable
`media comprises computer-readable code for receiving video
`from a video visitation device in a secure environment, stor(cid:173)
`ing the video received from the video visitation device in a
`data storage device, adjusting a depth of field parameter for
`20 the video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, and providing the adjusted video to a view-
`ing device located outside of the secure environment.
`In one embodiment, adjusting the depth of field parameter
`further comprises processing the video received from the
`video visitation device in a video processing device to blur
`one or more objects at the second distance from the video
`visitation device. Adjusting the depth of field parameter may
`30 be remotely controllable by a third-party monitor.
`The operations performed may further include providing
`the video to a second viewing device for security monitoring,
`the second viewing device being associated with a remote
`35 control device configured to allow the third-party monitor to
`remotely control the depth of field parameter. In an embodi(cid:173)
`ment, the operations include providing the video stored in the
`data storage device to an investigator in response to indicia
`from the third-party monitor. In still further embodiments, the
`40 operations include providing the video stored in the data
`storage device to an investigator in response to a request from
`the investigator.
`Embodiments of systems are also described. One embodi(cid:173)
`ment of a system includes a data communication device con-
`45 figured to receive video from a video visitation device in a
`secure environment. The system may also include a data
`storage device coupled to the data communication device and
`configured to store the video received from the video visita(cid:173)
`tion device. Additionally, the system may include a data pro-
`50 cessor configured to adjust a depth of field parameter for the
`video, such that an image of a first object at a first distance
`from the video visitation device is in focus and an image of a
`second object at a second distance from the video visitation
`device is blurred, wherein the data communication device is
`55 configured to provide the video to a viewing device located
`outside of the secure environment.
`In an embodiment, the system includes a camera controller
`configured to adjust an f-stop setting of a camera associated
`with the video visitation device. The camera controller may
`60 be controllable by a third-party to remotely adjust the f-stop
`setting. Additionally, the camera controller may be config(cid:173)
`ured to adjust a focal length of a lens coupled to the video
`visitation device. In an embodiment, the camera controller is
`further configured to adjust an aperture setting of the camera
`associated with the video visitation device.
`In one embodiment, the system includes a second viewing
`device for security monitoring, the second viewing device
`
`
`
`US 9,083,850 Bl
`
`3
`being associated with a remote control device configured to
`allow a third-party to remotely control the depth of field
`parameter.
`The data communication device may provide the video
`stored in the data storage device to an investigator in response
`to indicia from the third-party. In another embodiment, the
`system is configured to provide the video stored in the data
`storage device to an investigator in response to a request from
`the investigator.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Having thus described the invention in general terms, ref(cid:173)
`erence will now be made to the accompanying drawings,
`which are not necessarily drawn to scale, and wherein:
`FIG. 1 is a block diagram of an environment where a
`visitation system may be employed according to some
`embodiments.
`FIG. 2 is a diagram of a video visitation device according to
`some embodiments.
`FIG. 3 is a block diagram illustrating one embodiment of a
`video camera device for use in a video visitation system.
`FIG. 4 is a block diagram of an embodiment of a visitation
`system.
`FIG. 5 is a block diagram of an embodiment of a video
`visitation device.
`FIG. 6 is a block diagram of a computer system configured
`to implement various systems and methods described herein
`according to some embodiments.
`FIG. 7 is a flowchart of an embodiment of a method for
`video blurring in a secure environment.
`FIG. 8 is a flowchart of another embodiment method for
`video blurring in a secure environment.
`FIG. 9 is an illustrative drawing of one embodiment of a
`blurred video frame.
`
`DETAILED DESCRIPTION
`
`This specification discloses systems and methods for video
`blurring in a secure environment. Generally speaking, the
`various techniques described herein may find applicability in
`a wide variety of controlled-environment facilities. Examples
`of controlled-environment facilities may include correctional
`institutions or facilities (e.g., municipal jails, county jails,
`state prisons, federal prisons, military stockades, juvenile
`facilities, detention camps, home incarceration environ(cid:173)
`ments, etc.), healthcare facilities (e.g., hospitals, nursing
`homes, mental health facilities, rehabilitation clinics, such as
`drug and alcohol rehabilitation facilities, etc.), restricted liv(cid:173)
`ing quarters (e.g., hotels, resorts, camps, dormitories, bar(cid:173)
`racks, etc.), and the like. For convenience of explanation,
`various examples discussed herein are presented in the con(cid:173)
`text of correctional facilities. For instance, in some of the
`embodiments discussed below, a controlled-environment
`facility may be referred to as a jail or prison, and its residents
`may be referred to as residents, arrestees, detainees, or
`inmates. It should be understood, however, that the systems
`and methods described herein may be similarly applicable to
`other types of controlled-environment facilities and their
`respective residents (e.g., a hospital and its patients).
`Turning now to FIG. 1, a block diagram of an illustrative
`environment where a visitation system may be employed is
`depicted according to some embodiments. As shown, com(cid:173)
`munication processing system 101 may provide telephone
`services, videoconferencing, online chat, and other commu- 65
`nication services to a controlled-environment facility. For
`example, in some cases, communication system 101 may be
`
`4
`co-located with a controlled-environment facility. Alterna(cid:173)
`tively, communication system 101 may be centrally or
`remotely located with respect to one or more controlled(cid:173)
`environment facilities and/or may provide communication
`services to multiple controlled-environment facilities. More
`generally, however, it should be noted that communication
`system 101 may assume a variety of forms, and may be
`configured to serve a variety of facilities and/or users,
`whether within or outside of a controlled-environment facil-
`10 ity.
`In one embodiment, a hybrid system may be implemented.
`The hybrid system may include one or more centrally located
`components and one or more components that are located on
`the premises of the controlled facility. For example, a data
`15 storage may be located in an off-site cloud storage facility. In
`some embodiments, servers, security monitoring systems and
`other components described in further detail below may be
`located in a central or remote facility. In embodiments of a
`hybrid system, other components may be located within the
`20 controlled facility. For example, in some embodiments a
`video visitation device as described in FIGS. 2-3 may be
`located within the controlled facility. In certain embodiments,
`the inmates may be able to communicate using the video
`visitation devices with persons located outside of the con-
`25 trolled facility, wherein the person outside of the facility uses
`a desktop computer, tablet computer, or the like. In another
`embodiment, the inmate may communicate with a person
`located inside of the controlled facility such as a visitation
`area. In such an embodiment, but he inmate and the visitor
`30 may communicate using a video visitation device respec(cid:173)
`tively.
`In the context of a correctional facility, for instance,
`inmates may use video-enabled telephones 102 to access
`certain communication services. In some facilities, inmates
`35 may also use a personal computer wireless device 104 to
`access such services. For example, an inmate may initiate
`telephone services by lifting the receiver on telephone 102, at
`which time the inmate may be prompted to provide a personal
`identification number (PIN), other identifying information or
`40 biometrics. An interactive voice response (IVR) unit or inter(cid:173)
`active smart device which may use visual keys (touchscreen
`or the like) (not shown) may generate and play prompt or
`other messages to inmates on devices 102 and/or 104.
`Under the control of communication processing system
`45 101, devices 102 and 104 may be capable of connecting to a
`non-resident's (i.e., a person not committed to a controlled(cid:173)
`environment facility) telephone 106 or device 105 across a
`publicly switched telephone network (PSTN) 107. For
`example, telephone 106 may be located at a non-resident's
`50 home, inmate visitation center, etc. Switch 108 in communi(cid:173)
`cation processing system 101 may be used to connect calls
`across PSTN 107. Additionally or alternatively, the non-resi(cid:173)
`dent may be at telephone 109 or device 112, which is on an
`Integrated Services Digital Network (ISDN), Voice-over-IP
`55 (VoiP), or packet data network 110, such as, for example the
`Internet. Router 111 of communication system 101 is used to
`route data packets associated with a call connection to desti(cid:173)
`nation telephone 109.
`Video visitation devices 1 03a-n (each collectively referred
`60 to as "video visitation device 103") may have video confer(cid:173)
`encing capabilities to enable inmates to participate in video
`visitation sessions with non-residents of the correctional
`facility via video call, secure online chat, etc. For example, a
`non-resident party may have a personal or laptop computer
`113 with camera 114 (or a cell phone, tablet computer, etc.).
`In another embodiment, the non-residents may also use a
`separate set of video visitation devices 103c-m. In one
`
`
`
`US 9,083,850 Bl
`
`5
`embodiment, the non-resident may use a video visitation
`device 1 03c-m outside of the facility. In another embodiment,
`the non-resident may use a video visitation device 103c-m
`located in a secure area within the facility. A network con(cid:173)
`nection between the parties may be established and supported
`by an organization or commercial service that provides com(cid:173)
`puter services and software for use in telecommunications
`and/or VOIP, such as SKYPE® or by a propriety system.
`Additionally or alternatively, the correctional facility and/or
`the destination may use video conferencing equipment com(cid:173)
`patible with ITU H.323, H.320, H.264, and/or V.SO, or other
`suitable standards. Generally speaking, each video visitation
`device 103 may be disposed in a visitation area of the con(cid:173)
`trolled-environment facility. As noted above, there may be
`objects or persons in the environment of the video visitation
`which may be private or objectionable. For example, when an
`inmate is conducting a video visitation call, other inmates of
`the facility may exhibit objectionable behaviors in the back(cid:173)
`ground of the frame captured by the video visitation device
`103. For these and other reasons, the inventor hereof has
`developed various systems and methods of blurring video
`captured by the video visitation devices 103, as described in
`more detail in connection with FIGS. 2-6 below.
`In addition to providing certain visitation and communica(cid:173)
`tion operations, communication processing system 101 may
`attempt to ensure that an inmate's calls, video conferences,
`online chats, etc. are performed only with non-residents
`whose identities, devices, email addresses, phone numbers,
`etc. are listed in that inmate's Pre-Approved Contact (PAC)
`list. Each inmate's PAC list may be stored, for example, in
`database 115 maintained by an Administration and Manage(cid:173)
`ment System (AMS) 116. In addition to PAC list(s),AMS 116
`may also store inmate or resident profile data (RPD), as well
`as visitation rules applicable to each inmate. As an example,
`in the context of a correctional facility, database 115 may
`include information such as balances for inmate trust and
`calling accounts, trial schedule, conviction data, criminal
`record, sentencing data, such as time served, time remaining
`to be served, and release date, cell and cellmate assignments,
`inmate restrictions and warnings, commissary order history,
`telephone call history, call recordings, known or suspected
`gang or criminal affiliations, known or suspected affiliates,
`accomplices, or gang members; and any other information
`that may be relevant or useful to correctional facility staff to 45
`house and maintain inmates.
`In some embodiments, database 115 may also indicate a
`personalized level of lighting that should be provided to a
`particular inmate during the inmate's video visitation ses(cid:173)
`sions depending, for example, upon who the identit(ies) of the
`inmate and/or the non-resident. Such personalized lighting
`levels may be configured according to the facility's goals.
`Visitation system 130 may be configured to provide, sched(cid:173)
`ule, and manage visitation services to residents and non(cid:173)
`residents of a controlled-environment facility. To that end,
`visitation system 130 may be coupled to PSTN 107 and/or
`network 110 in a manner similar to communication process(cid:173)
`ing system 101 by also including one or more switches and/or
`routers (not shown). Accordingly, visitation system 130 may
`be configured to communicate with one or more residents of
`the controlled-environment facility via devices 102-104 and
`with one or more non-residents via devices 105, 106, 109,
`112, and/or 113. Although visitation system 130 is shown in
`FIG. 1 as being remotely located with respect to communi(cid:173)
`cation processing system 101 and the controlled-environment
`facility, in other cases visitation system 130 may be co-lo(cid:173)
`cated with the facility and/or integrated within system 101.
`
`6
`In some implementations, communication system 101 may
`be configured to perform video visitation monitoring opera(cid:173)
`tions configured to monitor and or record video visitations
`(e.g., as video files). In scenarios where communication sys(cid:173)
`tem 101 is located within the controlled-environment facility,
`it may have direct access to AMS 116. In other embodiments,
`however, communication system 101 may be located
`remotely with respect to the controlled-environment facility,
`and access to AMS 116 may be obtained via a computer
`10 network such as, for example Network 110.
`FIG. 2 is a diagram of a video visitation device 103. In
`some embodiments, device 103 may be implemented as a
`computer-based system such as described in connection with
`FIG. 4. As illustrated, device 103 includes display 204, cam-
`15 era 205, and handset 201 coupled to device 103 via wire 209.
`Display 204 may be any suitable electronic display such as,
`for example, a Liquid Crystal Display (LCD), a touchscreen
`display (e.g., resistive, capacitive, etc.), or the like, whereas
`camera 205 may be any suitable imaging device such as, for
`20 instance, a video camera or webcam equipped with Charge(cid:173)
`Coupled Devices (CCDs), Complementary Metal-Oxide(cid:173)
`Semiconductor (CMOS) active pixel sensors, etc. Handset
`201 may be similar to a traditional telephone handset includ(cid:173)
`ing an earpiece portion (with a speaker), a handle portion, and
`25 a mouthpiece portion (with a microphone).
`During a video visitation session, video visitation device
`103 may be configured to capture a video image of an inmate
`to be transmitted to a non-resident using camera 205, and to
`display a video image of the non-resident to the inmate using
`30 display 204. Video visitation device 103 may also be config(cid:173)
`ured to capture an audio signal from the inmate to be trans(cid:173)
`mitted to the non-resident using the mouthpiece portion of
`handset 201, and to provide an audio signal from the non(cid:173)
`resident to the inmate using the earpiece portion of handset
`35 201. Additionally or alternatively, audio received from the
`non-resident may be reproduced via loudspeaker 202, and
`audio provided by the inmate may be captured via micro(cid:173)
`phone 203. In some embodiments, handset holder or holster
`208 may be configured to allow a user to securely rest handset
`40 201 against device 103 (e.g., in its "off' position) when device
`103 is not in use. Furthermore, handset holder 208 may
`include a mechanical or electromechanical switch or sensor
`(not shown) that senses when handset 201 is not resting
`against it (e.g. in its "on" position).
`Video visitation device 103 may also include lighting
`device 206 and lighting sensor 207. In some embodiments,
`lighting device 206 may include one or more incandescent
`light sources (e.g., bulbs, lamps, etc.), fluorescent lamps,
`Compact Fluorescent Lamps (CFL), Cold Cathode Fluores-
`50 cent Lamps (CCFL), high-intensity discharge sources, Light(cid:173)
`Emitting Diodes (LEDs ), or the like. Additionally or alterna(cid:173)
`lighting device 206 may include one or more
`tively,
`adjustable lighting devices with variable intensity, brightness,
`luminance, color, tone, etc. Lighting or light sensor 207 may
`55 include one or more suitable sensors such as, for example,
`photoresistors, photodiodes, etc. In various implementations,
`camera 205 may serve as light sensor 207, and light sensor
`207 may be absent.
`Furthermore, it should be noted that, outside of correc-
`60 tiona! facilities, video visitation device 103 may assume the
`form of any computer, tablet computer, smart phone, etc., or
`any other consumer device or appliance with videoconferenc(cid:173)
`ing capabilities. For example, in the case where video visita(cid:173)
`tion device 103 is a camera-enabled television (or smart
`65 phone, etc.) that does not include a dedicated lightning appa(cid:173)
`ratus, the brightness of display 204 may be adjusted so that
`display 204 may itself act as lighting device 206 (e.g., the
`
`
`
`US 9,083,850 Bl
`
`7
`brightness of display 204 may be increased to also increase
`the illumination of the person( s) "watching" the teleconfer(cid:173)
`ence through the television, for example, upon detection that
`a video connection has been established).
`In the context of correctional facilities, video visitation
`device 103 may include one or more tampering/impact resis(cid:173)
`tant or hardened elements configured to protect them from
`vandalism or otherwise destructive acts. For example, one or
`more of devices 202-207 may be protected by a transparent
`plastic or thermoplastic (e.g., Plexiglas, etc.) material.
`In one embodiment, the video visitation device 103 may
`include a keypad 210 or other user input device to allow a user
`to enter information. For example, the user may dial a tele(cid:173)
`phone number associated with a recipient of a video visitation
`call, enter an account number for billing purposes, or enter a 15
`Personal Identification Number (PIN) or inmate number for
`authentication and/or identification purposes.
`FIG. 3 is a block diagram illustrating one embodiment of a
`video camera device 205 for use in a video visitation system
`103. In an embodiment, the video camera device 205 may 20
`include an image sensor 301. For example, the image sensor
`may be configured to capture a sequence of images suitable
`for generating video. One of ordinary skill will recognize that
`there are many different image sensors 301 which may be
`used according to the present embodiments, including 25
`Charge-Coupled Devices (CCDs) or Complimentary Metal(cid:173)
`Oxide-Semiconductor (CMOS) image sensors.
`In an embodiment, an arrangement of one or more lenses
`303 and/or an aperture mechanism 302 may be coupled to the
`image sensor 301. For example, a first lens 303a and a second 30
`lens 303b may be used to set a focal length of the camera
`device 205. The focal length may be adjusted by adjusting a
`distance between the first lens 303a and the second lens 303b.
`The aperture mechanism 302 may be adjusted to change the
`aperture through which light passes to the image sensor 301.
`The depth of field of the camera 205 may be adjusted by either
`changing the focal length by adjusting the lenses 303a,b or by
`adjusting the aperture size by adjusting the aperture mecha(cid:173)
`nism 302. In general, the ratio of the focal length set by the
`lenses 303a and/or 303b to the aperture size is referred to as
`the f-stop or relative aperture of the camera system 205. The
`depth of field is the distance between the nearest and farthest
`objects in a scene that appear acceptably sharp in an image.
`The depth of field may be manipulated by adjustment of the
`f-stop of the camera system 205 or through digital processing 45
`techniques.
`In such an embodiment, the depth of field of the camera
`system 205 may be adjusted such that a first object 304
`positioned at a first distance 306 from the image sensor 301
`may be in focus, while a second image 305 positioned at a 50
`second distance 307 or greater may be blurred. The lenses
`303a-b and/or the aperture mechanism 302 may be adjusted
`to increase or decrease the depth of field of the camera system
`such that both the first object 304 and the second object 305
`are in focus at a first setting, or such that only the first object 55
`304 is in focus at a second setting, or such that only the second
`object is in focus at a third setting.
`FIG. 4 is a block diagram of an embodiment of the visita(cid:173)
`tion system 130. In one embodiment, the visitation system
`130 may include a