Not applicable.
This disclosure relates generally to systems and methods to assist in managing information including multi-media and/or associated data files in a cloud based storage area. More particularly, but not by way of limitation, this disclosure relates to systems and methods for managing storage, access, and security requirements of cloud based copies of potential evidentiary information collected by one or more surveillance systems.
Today's law enforcement agencies are increasing their use of digital data to collect surveillance information and other forms of data to be used as evidence in legal proceedings. Devices and methods for managing multi-media files collected as part of this surveillance and evidence collection are increasing both in number and complexity over time. Multi-media files may be large. As used in law enforcement and other industries that require secure access, multi-media files have traditionally been burned onto Digital Versatile Disks (DVDs) or other high capacity storage medium such that the physical media may be transported to another location in a secure manner.
For example, traditional law-enforcement video solutions typically offer a way to export videos onto optical media such as DVDs and distribute the recorded media to third parties. Third parties typically include other parties to a particular legal proceeding or investigation. Third parties may include the district attorney, defendants, other attorneys, other law enforcement agencies, and so on. For a large agency, creation of optical media may involve expensive equipment (e.g., disc burning and duplication machines) as well as material costs. Technical personnel may also be required to maintain and operate that equipment. Further, once a media is burned into a physical copy, security around access to that physical copy may be a labor intensive undertaking for law-enforcement employees.
Accordingly, systems and methods for cloud based information storage, access and security as disclosed herein, may provide alternatives to previously known methods of providing access to evidentiary information while conforming to special requirements associated with that type of data.
According to a first aspect of the invention, a computer system configured to receive and manage multi-media recordings is disclosed. This embodiment of the computer system includes one or more processors; one or more network communication interfaces communicatively coupled to the one or more processors; and a storage area accessible to the one or more processors. The one or more processors are configured to execute instructions to cause the one or more processors to at least receive at least one multi-media file and one or more metadata files containing attributes of the at least one multi-media file using a network interface. The attributes including at least an event tag for use in categorizing the at least one multi-media file. The one or more processors are further configured to provide a set of evidentiary controls for the at least one multi-media file. Based on the categorization, a third party recipient of the information pertaining to the at least one multi-media file is determined and an indication pertaining to accessing the at least one multi-media file is sent.
According to a second aspect of the invention, a computer system configured to receive and manage multi-media recordings is disclosed. This embodiment of the computer system also includes one or more processors; one or more network communication interfaces communicatively coupled to the one or more processors; and a storage area accessible to the one or more processors. The one or more processors are configured to execute instructions to cause the one or more processors to receive from a network interface at least one multi-media file and one or more associated metadata files containing attributes including an event tag for the at least one multi-media file. The one or more processors are further configured to categorize the at least one multi-media file using the event tag and provide a set of evidentiary controls for the at least one multi-media file. Also, an automatic upload to a cloud based server of at least a portion of the one or more metadata files and the at least one multi-media file may be automatically initiated based on the categorization.
According to a third aspect of the invention, a computer system configured to capture and manage multi-media recordings is disclosed. In this embodiment, the computer system includes one or more processors; one or more audio capture devices communicatively coupled to the one or more processors; one or more video capture devices communicatively coupled to the one or more processors; one or more network communication interfaces communicatively coupled to the one or more processors; and a storage area accessible to the one or more processors. The one or more processors are configured to execute instructions to cause the one or more processors to receive information from the one or more audio capture devices and the one or more video capture devices, the information used to create one or more metadata files and at least one multi-media file associated with the one or more metadata files. An event tag may be determined for use in categorizing the created multi-media file. Automatic upload may be initiated to a cloud based server based on the event tag.
Other aspects of the embodiments described herein will become apparent from the following description and the accompanying drawings, illustrating the principles of the embodiments by way of example only.
It being understood that the figures presented herein should not be deemed to limit or define the subject matter claimed herein, the applicants' disclosure may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements.
Certain terms are used throughout the following description and claims to refer to particular system components and configurations. As one skilled in the art will appreciate, the same component may be referred to by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . . ” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device couples to a second device, that connection may be through a direct connection, or through an indirect connection via other devices and connections.
As used throughout this disclosure the terms “computer device” and “computer system” will both be used to refer to an apparatus that may be used in conjunction with disclosed embodiments of cloud based information, storage, access, and security methods and systems. As used herein, a computer device may be thought of as having a subset of functionalities as compared to a computer system. That is, a computer device may refer to a special purpose processor-based device such as a digital video surveillance system primarily configured for executing a limited number of applications. A computer system may more generally refer to a general purpose computer such as a laptop, workstation, or server which may be configured by a user to run any number of off the shelf or specially designed software applications. Computer systems and computer devices will generally interact with disclosed methods and systems for cloud information, storage, access and security in the same or similar ways.
The terms “cloud storage” or “cloud based storage” are used interchangeably in this disclosure to describe that data is stored in an area generally accessible across a network (which may or may not be the Internet). A “cloud” may refer to a public cloud, private cloud, or combination of a public and private cloud (e.g., hybrid cloud). The term “public cloud” generally refers to a cloud storage area that is maintained by an unrelated third party but still has certain security measures in place to ensure that access is only allowed to authorized users. The term “private cloud” generally refers to a cloud storage area that is maintained by a related entity or that is maintained on separate physical computer resources from any unrelated users.
For simplicity the term “multi-media” will be used throughout this disclosure to refer to files collected (e.g., recorded) by an audio or audio/video recorder. Multi-media files may include only audio, only video, or audio and video together and the information may be compressed using an industry standard compression technology (e.g., Motion Picture Expert Group (MPEG) standards, Audio Video Interleave (AVI), etc.) or another proprietary compression or storage format. Multi-media files may have associated data files, including metadata files that may be configured in a structured text format such as eXtensible Markup Language (XML).
This disclosure also refers to storage devices and storage drives interchangeably. In general, a storage device/drive represents a medium accessible by a computer to store data and executable instructions. Also, throughout this disclosure reference will be made to “plugging in” a storage drive. It is noted that “plugging in” a storage drive is just one way to connect a storage drive to a computer device/system. This disclosure is not intended to be limited to drives that physically “plug in” and disclosed embodiments are also applicable to devices that are “connected” to a computer device or computer system. For example devices may be connected by using a cable or by connecting using a computer bus. Additionally, references to “removable” storage are analogous to plugging-in/unplugging a device, connecting/disconnecting cabled access to a device, and/or establishing/disconnecting networked access to a device or storage area on a network (either wired or wireless).
As used herein, the term “evidentiary requirements” refers to one or more requirements required for data collected that may later be used as evidence in a legal proceeding. These requirements are discussed throughout this disclosure and include: chain of custody of evidence, access controls, audit functions, retention policies, and the like. The term “evidentiary controls” refers to controlling at least some of the discussed evidentiary requirements.
While various embodiments are described herein, it should be appreciated that the present disclosure encompasses many inventive concepts that may be embodied in a wide variety of contexts. Thus, the following detailed description of exemplary embodiments, read in conjunction with the accompanying drawings, is merely illustrative and is not to be taken as limiting the scope of this disclosure. Rather, the scope of the invention is defined by the appended claims and equivalents thereof.
Illustrative embodiments of this disclosure are described below. In the interest of clarity, not all features of an actual implementation are described for every embodiment disclosed in this specification. In the development of any such actual embodiment, numerous implementation-specific decisions must be made to achieve the design-specific goals, which will vary from one implementation to another. It will be appreciated that such a development effort, while possibly complex and time-consuming, would nevertheless be a routine undertaking for persons of ordinary skill in the art having the benefit of this disclosure.
Embodiments of the present disclosure provide for management and “virtual” sending of multi-media files and/or associated data files stored in cloud based storage. Virtual sending refers to sending of a link, such as a hyperlink, to assist in accessing the remotely stored information rather than sending actual files themselves. In some embodiments, the data shared relates to data that might be collected by one or more, mobile surveillance systems, portable video recording devices, and other types of data recorders. The mobile (and possibly stationary) surveillance system devices may be configured to capture video, audio, and data parameters pertaining to activity in the vicinity of the surveillance system, for example a police vehicle. Other type of vehicles and other situations requiring a surveillance unit are also within the scope of this disclosure. Other types of vehicles may include, but are not limited to, any transportation means equipped with a mobile surveillance system (e.g., civilian transport trucks). The disclosed embodiments are explained in the context of mobile surveillance systems that aid in law enforcement such as busses, ambulances, police motorcycles or bicycles, fire trucks, airplanes, boats, military vehicles, and so on. However, in some embodiments, data collected from other types of vehicles including non law enforcement vehicles may be collected and managed in cloud based storage as required by that different industry.
Mobile surveillance systems have been in use by police departments for the past few decades. Over that period of time, several advances have been introduced in the technology used to provide video/audio and data regarding specific police events. In the late 1990s through the early 2000s, digital technologies became prevalent in the industry, replacing existing analog technologies. With the use of digital technologies, law enforcement agencies obtained several advances over previous technologies and may further benefit from additional advances (e.g., as described in this disclosure). In general, digital technologies are more adaptable and offer more opportunities for improvement than corresponding analog technologies. This is largely because digital video/audio files may be processed in a multitude of ways by specifically configured computer devices. This disclosure elaborates on several novel techniques to enhance the capability, reliability, ease of use, security, integrity, and other aspects of mobile surveillance systems and the information they collect.
Today, there are numerous surveillance systems in use by law enforcement and the data they collect continues to increase in volume and complexity. Accordingly, enhanced management techniques for the amount of available data may be required. That is, vast amounts of data may need to be collected and controlled with conformance to “evidentiary requirements” as discussed herein. Additionally, there is a need to improve data access and distribution, integrity, reliability, and security throughout the lifecycle of that data. Legal requirements for data collected by a remote/mobile surveillance system include conformance to judiciary requirements such as “chain of custody/evidence,” and “preservation of evidence.” Chain of custody (CoC), in legal contexts, refers to the chronological documentation or paper trail audit, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. Preservation of evidence is a closely related concept that refers to maintaining and securing evidence from a particular crime scene before it ultimately appears in a courtroom. For example, the evidence may go to a forensic laboratory prior to arriving at the courtroom. Evidence admissibility in court is predicated upon an unbroken chain of custody. It is important to demonstrate that the evidence introduced at trial is the same evidence collected at the crime scene [e.g. that is, all access to the evidence (e.g., electronic files) was controlled and documented], and that the evidence was not altered in any way. Requirements for law enforcement are further described in “Criminal Justice Information Services (CJIS) Security Policy,” version 5.3 published Aug. 4, 2014 referenced as “CJISD-ITS-DOC-08140-5.3” which is hereby incorporated by reference in its entirety.
As will be recognized, disclosed embodiments may allow for comprehensive back-office video management software to be provided using a software as a service (SAAS) architecture, giving each agency (even small remote agencies) the tools they need to capture, transfer, store and manage their digital video evidence from car to court. That is, the disclosed system and back-office management techniques meet the preservation of evidence requirements outlined above with respect to management of digital evidence for law enforcement. All activity with respect to digital evidence in the back-office system may be logged to ensure proper documentation of evidence handling. The disclosed system may include electronic transfer of evidence in a controlled manner and may provide comprehensive coordination of potential evidence captured from a plurality of surveillance systems. While the focus of this disclosure relates to cloud based maintenance and access to collected data, the disclosed system may also include integrated DVD burning software at different points in the evidence maintenance lifecycle as a means of evidence transfer to work in conjunction with cloud based maintenance and “virtual” transfer.
Referring now to
In addition to the components mentioned above, disclosed embodiments of integrated mobile surveillance system 100 may be configured to include functional components to provide operational characteristics that may include the following. A pre-event playback function which may be used to tag historical events. Recall, normal operation may be to record continuously to internal storage and to store tagged information (e.g., marked for export) to removable storage. However, in order to cover the case in which an incident occurred without a timely event trigger, the operator may instruct the system to navigate back to an earlier time captured in the internal storage and play back that video/audio information. The selected historical video, at any available point in time, may be marked, tagged for extraction, and stored to removable storage, as if the event had been tagged at that historical time. Another functional component may provide an instant replay function configured to playback the last predetermined amount of time with one button press. Note that both the instant replay and pre-event playback (along with general system operation) allow for simultaneous playback while the system is concurrently recording information. Pre-defined event tags and a pre-defined event tagging functions may also be provided. For example, tags may include DWI, felony, speeding, stop sign, chase, etc. The tagging action may be used to catalog portions of recorded data. For example, after an event is cleared, such as stop recording, an option to select a predefined event may be displayed. Upon selection the system may allow an associated portion of collected information to be marked in a text file for current and future identification and storage. Further, when the tagged information is transferred to the data management software, the tagged information may be searched by event type and maintained on the server or in the cloud with the proper retention period as appropriate—based on the defined event type. A streaming function may also be provided to stream live view and recorded video, audio, and/or data over available wireless and wired networks. The integrated system 100 may also integrate “hotspot” capabilities which allow the system to serve as an agency accessible, mobile wireless local area network (WLAN).
Referring now to
Program control device 210 may be included in a device 200 and be programmed to perform techniques including cloud based storage of data and/or associated multi-media files, in accordance with this disclosure. Program control device 210 comprises a processor unit (PU) 220, input-output (I/O) interface 250 and memory 230. Processing unit (PU) 220 may include any programmable controller device including, for example, the Intel Core®, Pentium® and Celeron® processor families from Intel and the Cortex ARM processor families from ARM® (INTEL® CORE®, PENTIUM® and CELERON® are registered trademarks of the Intel Corporation. CORTEX® is a registered trademark of the ARM Limited Corporation. ARM® is a registered trademark of the ARM Limited Company). Memory 230 may include one or more memory modules and comprise random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), programmable read-write memory, and solid state memory. One of ordinary skill in the art will also recognize that PU 220 may also include some internal memory including, for example, cache memory.
Various changes in the materials, components, circuit elements, as well as in the details of the illustrated systems, devices and below described operational methods are possible without departing from the scope of the claims herein. For instance, acts in accordance with disclosed functional capabilities may be performed by a programmable control device executing instructions organized into one or more modules (comprised of computer program code or instructions). A programmable control device may be a single computer processor (e.g., PU 220), a plurality of computer processors coupled by a communications link or one or more special purpose processors (e.g., a digital signal processor or DSP). Such a programmable control device may be one element in a larger data processing system such as a general purpose computer system. Storage media, as embodied in storage devices such as PSD 280 and memory internal to program control device 210 are suitable for tangibly embodying computer program instructions. Storage media may include, but not be limited to: magnetic disks (fixed, floppy, and removable) and tape; optical media such as CD-ROMs and Digital Versatile Disks (DVDs); and semiconductor memory devices such as Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Programmable Gate Arrays and flash devices. These types of storage media are also sometimes referred to as computer readable medium or program storage devices.
Referring now to
Referring now to
Docking station 400 may have integrated interfaces to different types of surveillance systems. Interfaces such as, USB, wired Ethernet or wireless network, as well as interface ports for battery charging may be included. Docking station 400 may also contain: a CPU and be configured as a computer device (see
Docking station 400 may also have an internal storage device to facilitate fast off-load storage which may be used to facilitate a download/forward process for audio/video and metadata captured on a surveillance system device (e.g. the body worn camera 450). For example, the user may place the body worn camera 450 into a docking station cradle 415 and docking station 400 offloads the data to the local onboard storage drive (not shown) which may immediately (or based on a timer) upload that information, or a portion thereof, to a server (e.g., back office server or cloud storage). Uploads may be prioritized based on many different attributes such as time, size, event type priority, and so on. Docking station 400 may also have an integrated locking mechanism for one or more of the uploading/charging ports/cradles 415. The docking station 400 may be configured to control the locking mechanism to hold or release the wearable device in order to prevent the user from taking it out during uploading/downloading, or to make sure that only the recently “checked out” device is removed, for example.
The touch screen display 410 of
Having the above understanding of how multi-media files and associated metadata may be collected, we now turn to a discussion of a cloud based storage model for securing and auditing access to recorded information. The cloud based storage model may be beneficial for both small and large law-enforcement agencies as well as other industries.
Referring now to
Beginning at block 505, video recorded and its associated metadata are identified. This may happen during a patrol shift, or may happen at the end of a patrol shift. For example, as the officer performs his shift duties (e.g., goes on patrol, etc.), a recording device may record and store evidence and surveillance data onto the storage device of the recording device. During the shift, all data recorded on the storage device may be associated with the officer for audit tracking purposes and a metadata file may be used to “tag” or “mark” any recorded data with any number of pertinent attributes such as, officer's ID, event type, date/time, GPS location, etc. This “tagging” may happen automatically or manually as discussed above and shown at block 510. Next, at block 515 the recording device may connect to a network using one of many different connection types. Different types of connections may be available during a patrol shift (e.g., broadband, satellite link, and so on) or at the end of a patrol shift (e.g., WiFi, Bluetooth, broadband, satellite link, Ethernet, and so on). For simplicity, only a few specific examples are described here, but others would be apparent to those of ordinary skill in the art, given the benefit of this disclosure. At block 520, based on a) the connection type and b) what other system/device the recording device has established a connection to, different process flow options are shown in
After a connection is established (as shown at block 525) between the recording device and one or more back office servers, the functionality of the one or more back office servers may interact with the recording device and either perform data offload and staging functions (block 535) and/or communicate directly with SAAS functionality and/or cloud storage (block 540). Of course, the back office servers may perform different offload functions based on the attributes of the multi-media files (e.g., metadata tags). For example, the back office servers may transmit some multi-media files with their associated metadata directly to the cloud storage while offloading others to a local offload storage area. Some multi-media files and their associated metadata files may be both staged locally and sent to the cloud concurrently. Many different options are available. Options discussed here are only to be considered non-limiting examples. Similarly, block 530 indicates a connection has been established with a docking station such as docking station 400. As explained above, some embodiments of a docking station may include functionality to automatically offload and stage data via the docking station itself and upload to cloud storage (block 540). Additionally, like the back office servers, a docking station may, in some embodiments, communicate directly with SAAS and/or cloud storage (block 540). Although not explicitly shown in
Continuing on with
Having an understanding of the above discussed data flows 500 and 560, it will be understood that one example embodiment may include a remote application and database server that may be hosted by a software as a service (SAAS) cloud application to reduce (or eliminate) the need to hire additional computer technicians. Some disclosed embodiments may be implemented in a hybrid cloud and provide local (on site) data storage for portions of data that require high bandwidth across a network (e.g., Internet, police network) while maintaining metadata in the cloud. This configuration may help ensure security and integrity of digital evidentiary data by maintaining a single global copy of metadata in the cloud (for storage) while still allowing fast local access speeds for review of potentially large video/audio files. Also, optionally, data on a shared server may be downloaded to the local data storage site as backup data and then re-uploaded to a remote (or cloud based) site if there is a systems failure or “intrusion” attack at the remote (or cloud based site).
To eliminate the need for (or to augment) a conventional DVD burner based system, the user may auto upload all data and metadata to the cloud. Optionally, a user may provide (or user event tags may be used as) identification criteria for certain types of videos (and their metadata) to be sent to the cloud automatically as soon as the videos are uploaded to a server (or staged on docking station 400) with certain “event type” metadata. For example, an administrator may define: all Driving under the Influence (DUI) videos are sent to cloud based storage and 2 DVD copies are burned. When an officer tags a video as a DUI event type, as soon as the video is uploaded to the cloud, the video may also be sent to a DVD burner for 2 copies automatically. Alternatively, rather than burning DVD copies, an email may be automatically generated and sent or instructions may be provided to an employee to create and send an email. The email may include a time limited access link to personnel or third parties (e.g., prosecuting attorney) that may have an interest in the DUI event. Based on the tag type assigned, a wide number of triggers and follow-on responses may be generated automatically. Furthermore, actions relating to compliance with record retention policies may be automatically generated so that as specific retention periods pass, records are automatically deleted. Thus, the user may readily and easily take advantage of cloud-based storage for an almost limitless cataloguing and archiving device.
Referring now to
Local hardware/software storage 644 at police station 640 may be any storage device, such as local hard drives, removable drives, network drives, and so on. As shown in
As disclosed, a cloud-based video export and access system may reduce the hardware and ongoing maintenance costs of optical media based systems by providing users a secure, controlled, reliable and cost-effective method for sending video and data to third parties. Video and data may be uploaded to the cloud for storage, one or more third party recipients may be assigned access rights, and a defined expiration date for third party access may also be provided. Additionally, use of the cloud may permit real-time data upload and storage which provides nearly limitless data storage capacity for mobile surveillance system 100 (
Exported data may be stored in cloud-based storage that is remotely accessible through a secured means (for example, but not limited to, a password, finger print reader, etc). As explained above in the discussion of
In order to comply with laws, court orders or record-retention policies relating to data access, the system may be configured to remove the accessible data after a predetermined expiration date. A cloud-based system thus allows users to retain the original data while limiting third party access to such data. For example, remote access point 1 (680) may allow a first group of users to access content via communication channel 681. Similarly, remote access point 2 (682) may allow additional groups of people to access content via communication channel 683. Any number of remote user groups and links may be provided for as represented by remote access point N (684) and communication channel 685. Once an access link has expired, no third party may access the expired data. The disclosed SAAS system may also provide bookkeeping functions to track content access, bandwidth usage, and subscription expiration, etc. This bookkeeping function may be capable of statistical analysis, billing, and may generate reports and invoices as needed.
In the example of block diagram 600, a surveillance system vendor 670 oversees and maintains SAAS functions 620 utilizing communication channel 665. The vendor may also optionally maintain the security and integrity of any cloud based storage system 630 utilizing communication channel 666. Vendor 670 may also provide all necessary technical support through its software 620 and communication channel 645 to assist police station 640 in implementing best practices in the preservation of data evidence. Police station 640, depending on available resources, may have “in-house” routers (not shown) and surveillance system backend server(s) 642 which provide redundant data storage systems. Police station 640, in order to avoid expensive data storage solutions, may optionally utilize cloud storage 630 via communication channel 650. Cloud storage system 630 may also communicate directly with SAAS functions through communications channel 655. Having multiple channels of secured communications may provide rapid and efficient data exchange. Use of various storage means, (locally or cloud-based) allows an inexpensive and flexible alternative to resource-limited users.
In light of the principles and example embodiments described and illustrated herein, it will be recognized that the example embodiments may be modified in arrangement and detail without departing from such principles. Also, the foregoing discussion has focused on particular embodiments, but other configurations are also contemplated. In particular, even though expressions such as “in one embodiment,” “in another embodiment,” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the invention to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments. As a rule, any embodiment referenced herein is freely combinable with any one or more of the other embodiments referenced herein, and any number of features of different embodiments are combinable with one another, unless indicated otherwise.
Similarly, although example processes have been described with regard to particular operations performed in a particular sequence, numerous modifications might be applied to those processes to derive numerous alternative embodiments of the present invention. For example, alternative embodiments may include processes that use fewer than all of the disclosed operations, processes that use additional operations, and processes in which the individual operations disclosed herein are combined, subdivided, rearranged, or otherwise altered.
This disclosure may include descriptions of various benefits and advantages that may be provided by various embodiments. One, some, all, or different benefits or advantages may be provided by different embodiments. In view of the wide variety of useful permutations that may be readily derived from the example embodiments described herein, this detailed description is intended to be illustrative only, and should not be taken as limiting the scope of the invention. What is claimed as the invention, therefore, are all implementations that come within the scope of the following claims, and all equivalents to such implementations.
This application claims the benefit of, and priority to, U.S. Provisional Application No. 62/044,139, filed Aug. 29, 2014, and entitled, “Compact Multi-Function DVR with Multiple Integrated Wireless Data Communication Devices,” which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
62044139 | Aug 2014 | US |