Not applicable.
This disclosure relates generally to systems, methods, and apparatuses to assist in managing, communicating, and distributing information including multi-media and/or associated data files. More particularly, but not by way of limitation, this disclosure relates to systems and methods for managing storage, access and distribution of multi-media and/or associated data files under security requirements.
Today's law enforcement agencies are increasing their use of digital data to collect surveillance information and other forms of data to be used as evidence in legal proceedings. Devices and methods for managing multi-media files collected as part of this surveillance and evidence collection are increasing both in number and complexity over time. Multi-media files may be large. As used in law enforcement and other industries that require secure access, multi-media files have traditionally been burned onto Digital Versatile Disks (DVDs) or other high capacity storage medium such that the physical media may be transported to another location in a secure manner.
For example, traditional law-enforcement video solutions typically offer a way to export videos onto optical media such as DVDs and distribute the recorded media to third parties. Third parties typically include other parties to a particular legal proceeding or investigation. Third parties may include the district attorney, defendants, other attorneys, other law enforcement agencies, and so on. For a large agency, creation of optical media may involve expensive equipment (e.g., disc burning and duplication machines) as well as material costs. Technical personnel may also be required to maintain and operate that equipment. Further, once a media is burned into a physical copy, security around access to that physical copy may be a labor-intensive undertaking for law-enforcement employees.
Accordingly, systems and methods for information management, storage, access and distribution as disclosed herein, provide alternatives to previously known methods of providing access to evidentiary information while conforming to special requirements associated with that type of data.
According to a first aspect of the invention, a method is disclosed. This embodiment includes converting at least one audiovisual data file to generate a modified version of the at least one audiovisual data file; and sending a notice to at least one recipient via a communication network, wherein the notice includes a link to access the at least one audiovisual data file and/or the modified version of the at least one audiovisual data file.
According to a second aspect of the invention, a system is disclosed. This embodiment includes one or more processors configured to execute instructions to cause the one or more processors to: convert at least one audiovisual data file to generate a modified version of the at least one audiovisual data file; and send at least one recipient a notice via a communication network, wherein the notice includes a link to access the at least one audiovisual data file and/or the modified version of the at least one audiovisual data file.
Other aspects of the embodiments described herein will become apparent from the following description and the accompanying drawings, illustrating the principles of the embodiments by way of example only.
It being understood that the figures presented herein should not be deemed to limit or define the subject matter claimed herein, the applicants' disclosure may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements.
Certain terms are used throughout the following description and claims to refer to particular system components and configurations. As one skilled in the art will appreciate, the same component may be referred to by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . .” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device couples to a second device, that connection may be through a direct connection, or through an indirect connection via other devices and connections.
As used throughout this disclosure the terms “computer device” and “computer system” will both be used to refer to an apparatus that may be used in conjunction with disclosed embodiments of cloud based information, storage, access, and security methods and systems. As used herein, a computer device may be thought of as having a subset of functionalities as compared to a computer system. That is, a computer device may refer to a special purpose processor-based device such as a digital video surveillance system primarily configured for executing a limited number of applications. A computer system may more generally refer to a general-purpose computer such as a laptop, workstation, or server which may be configured by a user to run any number of off the shelf or specially designed software applications. Computer systems and computer devices will generally interact with disclosed methods and systems for cloud information, storage, access and security in the same or similar ways.
The terms “cloud storage” or “cloud based storage” are used interchangeably in this disclosure to describe that data is stored in an area generally accessible across a communication network (which may or may not be the Internet). A “cloud” may refer to a public cloud, private cloud, or combination of a public and private cloud (e.g., hybrid cloud). The term “public cloud” generally refers to a cloud storage area that is maintained by an unrelated third party but still has certain security measures in place to ensure that access is only allowed to authorized users. The term “private cloud” generally refers to a cloud storage area that is maintained by a related entity or that is maintained on separate physical computer resources from any unrelated users.
For simplicity, the terms “multi-media” and “audiovisual” will be used interchangeably throughout this disclosure to refer to files collected (e.g., recorded) by an audio or audio/video recorder. Multi-media or audiovisual data files may include only audio, only video, or audio and video together and the information may be compressed using an industry standard compression technology (e.g., Motion Picture Expert Group (MPEG) standards, Audio Video Interleave (AVI), etc.) or another proprietary compression or storage format. Multi-media or audiovisual files may incorporate associated data files, including metadata files that may be configured in a structured text format such as eXtensible Markup Language (XML).
This disclosure also refers to storage devices and storage drives interchangeably. In general, a storage device/drive represents a medium accessible by a computer to store data and executable instructions. Also, throughout this disclosure reference will be made to “plugging in” a storage drive. It is noted that “plugging in” a storage drive is just one way to connect a storage drive to a computer device/system. This disclosure is not intended to be limited to drives that physically “plug in” and disclosed embodiments are also applicable to devices that are “connected” to a computer device or computer system. For example, devices may be connected by using a cable or by connecting using a computer bus. Additionally, references to “removable” storage are analogous to plugging-in/unplugging a device, connecting/disconnecting cabled access to a device, and/or establishing/disconnecting networked access to a device or storage area on a network (either wired or wireless).
As used herein, the term “evidentiary requirements” refers to one or more requirements required for data collected that may later be used as evidence in a legal proceeding. These requirements are discussed throughout this disclosure and include: chain of custody of evidence, access controls, audit functions, retention policies, and the like. The term “evidentiary controls” refers to controlling at least some of the discussed evidentiary requirements.
The term “metadata” refers to information associated with the recording of audio data, video data, or audio and video data together, or information included in the recording of such data, and metadata may contain information describing attributes associated with one or more acts of actual recording of audio, video, or audio/video data. That is, the metadata may describe who (e.g., officer ID) or what (e.g., manual or automatic trigger) initiated or performed the recording. The metadata may also describe where the recording was made. For example, location may be obtained using global positioning system (GPS) information. The metadata may also describe why the recording was made (e.g., event tag describing the nature of the subject matter recorded). The metadata may also describe when the recording was made, using timestamp information obtained in association with GPS information or from an internal clock, for example. Metadata may also include information relating to the device(s) used to capture or process information (e.g. a unit serial number, mac address, etc.). Metadata may also include telemetry or other types of data. From these types of metadata, circumstances that prompted the recording may be inferred and may provide additional information about the recorded information. This metadata may include useful information to correlate recordings from multiple distinct recording systems. This type of correlation information may assist in many different functions (e.g., query, data retention, chain of custody, precise synchronization and so on).
While various embodiments are described herein, it should be appreciated that the present disclosure encompasses many inventive concepts that may be embodied in a wide variety of contexts. Thus, the following detailed description of exemplary embodiments, read in conjunction with the accompanying drawings, is merely illustrative and is not to be taken as limiting the scope of this disclosure. Rather, the scope of the invention is defined by the appended claims and equivalents thereof.
Illustrative embodiments of this disclosure are described below. In the interest of clarity, not all features of an actual implementation are described for every embodiment disclosed in this specification. In the development of any such actual embodiment, numerous implementation-specific decisions must be made to achieve the design-specific goals, which will vary from one implementation to another. It will be appreciated that such a development effort, while possibly complex and time-consuming, would nevertheless be a routine undertaking for persons of ordinary skill in the art having the benefit of this disclosure.
Embodiments of the present disclosure provide for management and “virtual” sending of multi-media files and/or associated data files stored in cloud based storage, a local or remote server, or a hybrid combination of cloud and local/remote server storage. Virtual sending refers to sending of a link, such as a hyperlink, to assist in accessing the remotely stored information rather than sending actual files themselves. In some embodiments, the data shared relates to data that might be collected by one or more, mobile surveillance systems, portable video recording devices, and other types of data recorders. The mobile (and possibly stationary) surveillance system devices may be configured to capture video, audio, and data parameters pertaining to activity in the vicinity of the surveillance system, for example a police vehicle. Other type of vehicles and other situations requiring a surveillance unit are also within the scope of this disclosure. Other types of vehicles may include, but are not limited to, any transportation means equipped with a mobile surveillance system (e.g., civilian transport trucks). The disclosed embodiments are explained in the context of mobile surveillance systems that aid in law enforcement such as busses, ambulances, police motorcycles or bicycles, fire trucks, airplanes, boats, military vehicles, and so on. However, in some embodiments, data collected from other types of vehicles including non-law-enforcement vehicles may be collected and managed in cloud based storage as required by that different industry.
Mobile surveillance systems have been in use by police departments for the past few decades. Over that period of time, several advances have been introduced in the technology used to provide video/audio and data regarding specific police events. In the late 1990s through the early 2000s, digital technologies became prevalent in the industry, replacing existing analog technologies. With the use of digital technologies, law enforcement agencies obtained several advances over previous technologies and may further benefit from additional advances (e.g., as described in this disclosure). In general, digital technologies are more adaptable and offer more opportunities for improvement than corresponding analog technologies. This is largely because digital video/audio files may be processed in a multitude of ways by specifically configured computer devices. This disclosure elaborates on several novel techniques to enhance the capability, reliability, ease of use, security, integrity, and other aspects of mobile surveillance systems and the information they collect.
Today, there are numerous surveillance systems in use by law enforcement and the data they collect continues to increase in volume and complexity. Accordingly, enhanced management and distribution techniques for the amount of available data may be required. That is, vast amounts of data may need to be collected and controlled with conformance to “evidentiary requirements” as discussed herein. Additionally, there is a need to improve data access and distribution, integrity, reliability, and security throughout the lifecycle of that data. Legal requirements for data collected by a remote/mobile surveillance system include conformance to judiciary requirements such as “chain of custody/evidence,” and “preservation of evidence.” Chain of custody (CoC), in legal contexts, refers to the chronological documentation or paper trail audit, showing the seizure, custody, control, transfer, analysis, and disposition of physical or electronic evidence. Preservation of evidence is a closely related concept that refers to maintaining and securing evidence from a particular crime scene before it ultimately appears in a courtroom. For example, the evidence may go to a forensic laboratory prior to arriving at the courtroom. Evidence admissibility in court is predicated upon an unbroken chain of custody. It is important to demonstrate that the evidence introduced at trial is the same evidence collected at the crime scene [e.g. that is, all access to the evidence (e.g., electronic files) was controlled and documented], and that the evidence was not altered in any way. Requirements for law enforcement are further described in “Criminal Justice Information Services (CJIS) Security Policy,” version 5.3 published Aug. 4, 2014 referenced as “CJISD-ITS-DOC-08140-5.3” which is hereby incorporated by reference in its entirety.
As will be recognized, disclosed embodiments may allow for comprehensive back-office video management software to be provided using a software as a service (SAAS) architecture, giving each agency (even small remote agencies) the tools they need to capture, transfer, store and manage their digital video evidence from car to court. That is, the disclosed system and back-office management techniques meet the preservation of evidence requirements outlined above with respect to management of digital evidence for law enforcement. All activity with respect to digital evidence in the back-office system may be logged to ensure proper documentation of evidence handling. The disclosed systems and techniques may include electronic transfer of evidence in a controlled manner and may provide comprehensive coordination of potential evidence captured from a plurality of surveillance systems. While the focus of this disclosure relates to maintenance, distribution, and access to collected data, the disclosed techniques may also include integrated DVD burning software at different points in the evidence maintenance lifecycle as a means of evidence transfer to work in conjunction with cloud based maintenance and “virtual” transfer.
Referring now to
In addition to the components mentioned above, disclosed embodiments of integrated mobile surveillance system 100 may be configured to include functional components to provide operational characteristics that may include the following. A pre-event playback function which may be used to tag historical events. Recall, normal operation may be to record continuously to internal storage and to store tagged information (e.g., marked for export) to removable storage. However, in order to cover the case in which an incident occurred without a timely event trigger, the operator may instruct the system to navigate back to an earlier time captured in the internal storage and play back that video/audio information. The selected historical video, at any available point in time, may be marked, tagged for extraction, and stored to removable storage, as if the event had been tagged at that historical time. Another functional component may provide an instant replay function configured to playback the last predetermined amount of time with one button press. Note that both the instant replay and pre-event playback (along with general system operation) allow for simultaneous playback while the system is concurrently recording information. Pre-defined event tags and a pre-defined event tagging functions may also be provided. For example, tags may include DWI, felony, speeding, stop sign, chase, etc. The tagging action may be used to catalog portions of recorded data. For example, after an event is cleared, such as stop recording, an option to select a predefined event may be displayed. Upon selection, the system may allow an associated portion of collected information to be marked in a text file for current and future identification and storage. Further, when the tagged information is transferred to the data management software, the tagged information may be searched by event type and maintained on the server or in the cloud with the proper retention period as appropriate—based on the defined event type. A streaming function may also be provided to stream live view and recorded video, audio, and/or data over available wireless and wired networks. The integrated system 100 may also integrate “hotspot” capabilities which allow the system to serve as an agency accessible, mobile wireless local area network (WLAN).
Referring now to
Program control device 210 may be included in a device 200 and be programmed to perform techniques including cloud based storage of data and/or associated multi-media files, in accordance with this disclosure. Program control device 210 comprises a processor unit (PU) 220, input-output (I/O) interface 250 and memory 230. Processing unit (PU) 220 may include any programmable controller device including, for example, the Intel Core®, Pentium® and Celeron® processor families from Intel and the Cortex ARM processor families from ARM® (INTEL® CORE®, PENTIUM® and CELERON® are registered trademarks of the Intel Corporation. CORTEX® is a registered trademark of the ARM Limited Corporation. ARM® is a registered trademark of the ARM Limited Company). Memory 230 may include one or more memory modules and comprise random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), programmable read-write memory, and solid state memory. One of ordinary skill in the art will also recognize that PU 220 may also include some internal memory including, for example, cache memory.
Various changes in the materials, components, circuit elements, as well as in the details of the illustrated systems, devices and below described operational methods are possible without departing from the scope of the claims herein. For instance, acts in accordance with disclosed functional capabilities may be performed by a programmable control device executing instructions organized into one or more modules (comprised of computer program code or instructions). A programmable control device may be a single computer processor (e.g., PU 220), a plurality of computer processors coupled by a communications link or one or more special purpose processors (e.g., a digital signal processor or DSP). Such a programmable control device may be one element in a larger data processing system such as a general-purpose computer system. Storage media, as embodied in storage devices such as PSD 280 and memory internal to program control device 210 are suitable for tangibly embodying computer program instructions. Storage media may include, but not be limited to: magnetic disks (fixed, floppy, and removable) and tape; optical media such as CD-ROMs and Digital Versatile Disks (DVDs); and semiconductor memory devices such as Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Programmable Gate Arrays and flash devices. These types of storage media are also sometimes referred to as computer readable medium or program storage devices.
Referring now to
Referring now to
Docking station 400 may have integrated interfaces to different types of surveillance systems. Interfaces such as, USB, wired Ethernet or wireless network, as well as interface ports for battery charging may be included. Docking station 400 may also contain: a CPU and be configured as a computer device (see
Docking station 400 may also have an internal storage device to facilitate fast off-load storage which may be used to facilitate a download/forward process for audio/video and metadata captured on a surveillance system device (e.g. the body worn camera 450). For example, the user may place the body worn camera 450 into a docking station cradle 415 and docking station 400 offloads the data to the local onboard storage drive (not shown) which may immediately (or based on a timer) upload that information, or a portion thereof, to a server (e.g., back office server or cloud storage). Uploads may be prioritized based on many different attributes such as time, size, event type priority, and so on. Docking station 400 may also have an integrated locking mechanism for one or more of the uploading/charging ports/cradles 415. The docking station 400 may be configured to control the locking mechanism to hold or release the wearable device in order to prevent the user from taking it out during uploading/downloading, or to make sure that only the recently “checked out” device is removed, for example.
The touch screen display 410 of
Having the above understanding of how multi-media files and associated metadata may be collected, we now turn to a discussion of a cloud based storage model for securing and auditing access to recorded information. The cloud based storage model may be beneficial for both small and large law-enforcement agencies as well as other industries.
Referring now to
Beginning at block 505, video recorded and its associated metadata are identified. This may happen during a patrol shift, or may happen at the end of a patrol shift. For example, as the officer performs his shift duties (e.g., goes on patrol, etc.), a recording device may record and store evidence and surveillance data onto the storage device of the recording device. During the shift, all data recorded on the storage device may be associated with the officer for audit tracking purposes and a metadata file may be used to “tag” or “mark” any recorded data with any number of pertinent attributes such as, officer's ID, event type, date/time, GPS location, etc. This “tagging” may happen automatically or manually as discussed above and shown at block 510. Next, at block 515 the recording device may connect to a communication network using one of many different connection types. Different types of connections may be available during a patrol shift (e.g., broadband, satellite link, and so on) or at the end of a patrol shift (e.g., WiFi, Bluetooth, broadband, satellite link, Ethernet, and so on). For simplicity, only a few specific examples are described here, but others would be apparent to those of ordinary skill in the art, given the benefit of this disclosure. At block 520, based on a) the connection type and b) what other system/device the recording device has established a connection to, different process flow options are shown in
After a connection is established (as shown at block 525) between the recording device and one or more back office servers, the functionality of the one or more back office servers may interact with the recording device and either perform data offload and staging functions (block 535) and/or communicate directly with SAAS functionality and/or cloud storage (block 540). Of course, the back-office servers may perform different offload functions based on the attributes of the multi-media files (e.g., metadata tags). For example, the back-office servers may transmit some multi-media files with their associated metadata directly to the cloud storage while offloading others to a local offload storage area. Some multi-media files and their associated metadata files may be both staged locally and sent to the cloud concurrently. Many different options are available. Options discussed here are only to be considered non-limiting examples. Similarly, block 530 indicates a connection has been established with a docking station such as docking station 400. As explained above, some embodiments of a docking station may include functionality to automatically offload and stage data via the docking station itself and upload to cloud storage (block 540). Additionally, like the back-office servers, a docking station may, in some embodiments, communicate directly with SAAS and/or cloud storage (block 540). Although not explicitly shown in
Continuing on with
Having an understanding of the above discussed data flows 500 and 560, it will be understood that one example embodiment may include a remote application and database server that may be hosted by a software as a service (SAAS) cloud application to reduce (or eliminate) the need to hire additional computer technicians. Some disclosed embodiments may be implemented in a hybrid cloud and provide local (on site) data storage for portions of data that require high bandwidth across a communication network (e.g., Internet, police network) while maintaining metadata in the cloud. This configuration may help ensure security and integrity of digital evidentiary data by maintaining a single global copy of metadata in the cloud (for storage) while still allowing fast local access speeds for review of potentially large video/audio files. Also, optionally, data on a shared server may be downloaded to the local data storage site as backup data and then re-uploaded to a remote (or cloud based) site if there is a systems failure or “intrusion” attack at the remote (or cloud based site).
To eliminate the need for (or to augment) a conventional DVD burner based system, the user may auto upload all data and metadata to the cloud. Optionally, a user may provide (or user event tags may be used as) identification criteria for certain types of videos (and their metadata) to be sent to the cloud automatically as soon as the videos are uploaded to a server (or staged on docking station 400) with certain “event type” metadata. For example, an administrator may define: all Driving under the Influence (DUI) videos are sent to cloud based storage and 2 DVD copies are burned. When an officer tags a video as a DUI event type, as soon as the video is uploaded to the cloud, the video may also be sent to a DVD burner for 2 copies automatically. Alternatively, rather than burning DVD copies, an email may be automatically generated and sent or instructions may be provided to an employee to create and send an email. The email may include a time limited access link to personnel or third parties (e.g., prosecuting attorney) that may have an interest in the DUI event. Based on the tag type assigned, a wide number of triggers and follow-on responses may be generated automatically. Furthermore, actions relating to compliance with record retention policies may be automatically generated so that as specific retention periods pass, records are automatically deleted. Thus, the user may readily and easily take advantage of cloud-based storage for an almost limitless cataloguing and archiving device.
Referring now to
Local hardware/software storage 644 at police station 640 may be any storage device, such as local hard drives, removable drives, network drives, and so on. As shown in
As disclosed, a cloud-based video export and access system may reduce the hardware and ongoing maintenance costs of optical media based systems by providing users a secure, controlled, reliable and cost-effective method for sending video and data to third parties. Video and data may be uploaded to the cloud for storage, one or more third party recipients may be assigned access rights, and a defined expiration date for third party access may also be provided. Additionally, use of the cloud may permit real-time data upload and storage which provides nearly limitless data storage capacity for mobile surveillance system 100 (
Exported data may be stored in cloud-based storage that is remotely accessible through a secured means (for example, but not limited to, a password, finger print reader, etc.). As explained above in the discussion of
In order to comply with laws, court orders or record-retention policies relating to data access, the system may be configured to remove the accessible data after a predetermined expiration date. A cloud-based system thus allows users to retain the original data while limiting third party access to such data. For example, remote access point 1 (680) may allow a first group of users to access content via communication channel 681. Similarly, remote access point 2 (682) may allow additional groups of people to access content via communication channel 683. Any number of remote user groups and links may be provided for as represented by remote access point N (684) and communication channel 685. Once an access link has expired, no third party may access the expired data. The disclosed SAAS system may also provide bookkeeping functions to track content access, bandwidth usage, and subscription expiration, etc. This bookkeeping function may be capable of statistical analysis, billing, and may generate reports and invoices as needed.
In the example of block diagram 600, a surveillance system vendor 670 oversees and maintains SAAS functions 620 utilizing communication channel 665. The vendor may also optionally maintain the security and integrity of any cloud based storage system 630 utilizing communication channel 666. Vendor 670 may also provide all necessary technical support through its software 620 and communication channel 645 to assist police station 640 in implementing best practices in the preservation of data evidence. Police station 640, depending on available resources, may have “in-house” routers (not shown) and surveillance system backend server(s) 642 which provide redundant data storage systems. Police station 640, in order to avoid expensive data storage solutions, may optionally utilize cloud storage 630 via communication channel 650. Cloud storage system 630 may also communicate directly with SAAS functions through communications channel 655. Having multiple channels of secured communications may provide rapid and efficient data exchange. Use of various storage means, (locally or cloud-based) allows an inexpensive and flexible alternative to resource-limited users.
As previously described, embodiments of this disclosure provide for various means of distribution for audiovisual and associated data files. For brevity, the terms “data file” and “data files” will be used to refer to audiovisual and/or associated data files. Under process flow 560, block 567 describes embodiments including a step for the determination of a method for data file delivery to identified third parties. Such embodiments provide alternatives to physical delivery of the data files. Some embodiments provide for the data files to be electronically delivered via a communication network (e.g., Internet, cloud, radio network, Bluetooth, Wi-Fi, 3G, 4G, LTE, satellite, etc.).
The export form 720 includes a Recipient Entry area 725 where one or more recipients are designated to receive a notice regarding designated data files. In the embodiment illustrated in
The export form 720 includes a Submit button 745 to send the notice via the communication network and a Cancel button 747 to cancel the submission process. In some embodiments, once the Submit button 745 is activated the selected data files are processed (as further described below) and the sender receives a confirmation indicating the data files have been processed/delivered. For example, some embodiments provide a pop-up window confirming that a designated data file was submitted to the cloud to be made available for access by a designated recipient(s). On the recipient side, the designated recipient(s) will receive a recipient communication indicating that the designated data files have been made available for access, downloading, and viewing, provided the recipient has the proper authorization.
As previously described, embodiments of this disclosure provide different options for processing, staging, and storing data files. Embodiments relating to the export and distribution of the data files to third parties also provide different options. As explained herein, data files may be uploaded to the cloud, facilitating real-time data processing and distribution. Cloud computing offers greater flexibility compared to conventional networked servers. Cloud computing offers fluctuating bandwidth portals, which facilitates real-time data transmission. For example, if data file size/quantity increases demand greater bandwidth, it is easy to scale up cloud capacity via virtual servers. Likewise, if one needs to scale down, the cloud's inherent flexibility allows for easy modification. Some embodiments may entail processing of the data files via local servers. Other embodiments may entail a hybrid system wherein some of the data files are processed via local servers and some files are uploaded to the cloud for processing. Regardless of where the data files are staged, stored, or processed, once the files are made available to a designated recipient (e.g. via recipient communication 755) the data must still be conveyed to the recipient.
It is well known in the field of computing that bandwidth defines the net bit rate, channel capacity, or the maximum throughput of a communication path in a communication network. Bit rate is a measurement of the number of bits that are transmitted over a set time period. The overall bit rate for a data file is a combination of the video stream and audio stream in the file. A simple analogy is the flow of water from a reservoir to a faucet. The water is pumped through a series of pipes linked between the reservoir and the faucet. For the data files, the audiovisual data is the water and the processing speed of computer processors represents the pump. The connection speed of the communication network (particularly the end user's connection speed) is determined by the network bandwidth, which corresponds to the diameter of the pipe. Increasing the diameter of the pipes allows for more water and more rapid flow via the pipes. Communication networks provide different bandwidth capabilities (typically established by the network provider). Regardless of the pumping power used to convey the water, there will always be a delay as the water travels through the pipes. For data files, the more data and the greater the size of the files transmitted across the network, transmission delays will vary depending on the available bandwidth. With data files, this delay increases the time it takes to convey the data bits to the end user, resulting in delayed downloads and video sputtering/freezing (e.g. when streaming a data file for playback). A way to compensate for this is to adjust the data file settings such that the overall data file bit rate is under the expected or known connection speed/bandwidth of the communication network to be used for download of the data file. By adjusting the settings or encoding the overall data file bit rate to be at or under the average connection speed (i.e. no greater than the applicable bandwidth capacity), downloading and video streaming by an end user is optimized.
Although communication network bandwidth specifications/communication speeds are disclosed by network providers, setting data file bit rates should take into account that different end users will typically have varying bandwidth/connection speed capabilities. Conventional audiovisual data encoding software provides encoding options to address such issues. One can encode a data file using variable bit rate (VBR) encoding or constant bit rate (CBR) encoding. With VBR encoding, one can set a maximum and minimum bit rate for the data file. For example, the encoding software can configure the data in the data file for transmission at a set minimum bit rate when there is little to no motion in the image and at a set maximum bit rate when there is frequent motion. This streamlines transmission of the data file across the communication network. However, care should be taken to avoid encoding at a maximum bit rate that exceeds the end user's bandwidth/connection speed. The data files may use CBR encoding when a flat bit rate will suffice for transmission across the applicable communication network.
Some embodiments of this disclosure entail processing of data files to convert such files to generate modified versions thereof to facilitate transmission across networks with bandwidth/connection speed limitations or restrictions. Such embodiments include making adjustments to the data file settings (e.g., compression, bit rate, quality, resolution, etc.). As well known by those skilled in the art, video resolution is determined by the number of lines and pixels set in formatting the video data. The greater the number of lines/pixels (i.e. higher resolution) used in formatting the video, the sharper the image quality. Embodiments of this disclosure may be implemented wherein one or more of the data file settings are adjusted during conversion of the file to generate a modified version with a different setting or settings compared to the setting(s) of the original data file. For example, adjustments can be made to the data file settings such as: resolution, bit rate, quality, compression, or a combination of these settings. Some embodiments entail conversion of a data file to generate a version with a lower resolution and/or a lower bit rate compared to those settings of the original file. Some embodiments entail conversion of a data file to generate a version with a higher data compression setting compared to the setting of the original file. Embodiments using data compression may entail lossy or lossless compression techniques as known in the art. Conventional software and encoding methods may be used to convert the data files to generate modified versions of the original data files. For example, but not by way of limitation, the data files may be converted using the H.264 or MPEG-4 Part 10, Advanced Video Coding (MPEG-4 AVC) video standard, the H.265 and MPEG-H Part 2, High Efficiency Video Coding (HEVC) standard, the VP9 video coding format developed by Google®, or subsequently developed standards and formats.
Some embodiments may be implemented by encoding the data files using fixed or constant bit rates in the conversion of the data files. That is, the user or a software algorithm can select and cause a data file to be encoded using a constant bit rate for conversion of the data file, generating a modified version of the original data file. Some embodiments provide options for use of variable bit rates, allowing one to mix and match bit rates in the conversion of the data files. That is, the user or a software algorithm can select and cause a data file to be encoded using different bit rates, e.g., using an established range of bit rates, for conversion and generation of a modified version of the original data file. Some embodiments are implemented for generation of the modified data file version using a variable bit rate with a set maximum bit rate limit or ceiling. The user or a software algorithm can select different bit rates to be applied for conversion of different individual files, different types of files, different groups of files (e.g., a group of files may be defined by the time of creation of the files, by being associated with one or more given recipient(s), by being associated with one or more given events or event types, etc.), or according to the available bandwidth/connection speed capacity. Some embodiments may also be implemented wherein a combination of data file settings (e.g. compression and resolution) are adjusted to generate the modified version of the data file. The ability to configure and adjust the data file settings provides greater flexibility to optimize the transfer and streaming of data files to the designated recipient(s).
In some embodiments, once a data file is designated for electronic export (e.g. via export form 720) it is then converted to generate the modified version. The original data file may be modified by adjusting one or more of the file's settings: bit rate, compression, quality, resolution, etc. The modified data file, with adjusted file settings, can be transmitted using less bandwidth compared to the bandwidth capacity required by the original (unmodified) data file. The modified data file is then placed in a staging area, along with the original data file. The staging area may be a local server, a cloud-based virtual server, or a hybrid combination of remote/local servers and cloud-based servers. In some embodiments, associated data files (e.g., containing metadata such as officer ID, bookmarks, etc.) may also be staged for download and viewing along with the original and/or modified data files, or separately in a cloud-based, local, or remote database. Each designated recipient is sent a notice via the communication network, indicating that the designated data files have been made available for access and viewing. The designated recipient can then access and view and download the original and/or the modified version of the data file. Having the option to download the modified data file allows recipients with bandwidth/connection speed limitations to access and view the data files made available.
In some embodiments, the original data file is uploaded or staged in a holding area (e.g., to a cloud-based server, local/remote server, or hybrid network) and the file is not converted to generate a modified version thereof (e.g. with higher compression and/or reduced bit rate) until the designated recipient accesses the file. For example, in some embodiments, once an administrator enters a data file for export in the File Name area 727 of the export form 720, the original data file may be staged in cloud storage and conversion of the data file to generate a modified version thereof will not occur until the designated recipient triggers access to view the file. When the designated recipient triggers access (e.g. by login via link 760), the original data file is converted to generate the modified version while the original data file is queued from the storage location and staged for access by the recipient (on the fly). The modified version of the data file is also made available for access by the recipient. This provides more efficient use of computing resources.
Once a designated recipient receives notification of the available access to the data files, he will have access to the files (e.g. via link 760) until the expiration date stated in the notice. The recipient can then log in and access either one or both of the data files (i.e. original data file and/or converted data file) as desired. Some embodiments provide secure methods for downloading and streaming the data files (e.g., using network protocols such as HTTPS, SFTP, etc.). Conventional data encryption techniques may also be used with embodiments of this disclosure (e.g., AES 256 or higher, SSH protocols, digital watermarking, cryptographic hash functions, etc.). In some embodiments, data uploaded to the cloud is remotely accessible through secured means (e.g., using passwords, biometric data readers, encryption, etc.), allowing a recipient to review the data stored in the cloud using a remote access point (e.g. 680, 682, 684,
Some embodiments of this disclosure include options for ongoing management of the data files and information made available to designated recipients. For example, some embodiments allow an administrator to make changes to the data files previously made available to designated recipients and to the expiration date by which a recipient can access the respective data file(s). In some embodiments, an administrator can: extend or shorten the access expiration date and time; cancel/modify access by individual designated recipients; add or remove designated recipients; add or remove data files; and/or edit information previously provided to recipients.
Upon selection of the Electronic Export Queue Management option 791 on Management Setup form 770, a Queue Management screen 800 is presented.
It will be appreciated by those skilled in the art that the processing and handling of the data files for export and distribution can be performed using conventional computer platforms entailing processors configured with conventional software coded to perform the disclosed techniques. For example, but not by way of limitation, platforms such as Microsoft® Cloud services may be used to implement embodiments of this disclosure. It will also be appreciated that any suitable device may be used to implement the embodiments of this disclosure. For example, embodiments may be implemented for operation with a smartphone or a tablet device. As previously described, embodiments may be implemented wherein the recipient notification (which notifies the recipient of available data files, access link, access expiration date, etc.) is transmitted by conventional means such as email, messaging services such as Short Messaging Service and Multimedia Messaging Service, and/or other messaging methods that communicate using social media networks. Some embodiments may be implemented using a mobile device equipped with an application (“app”) configured to perform the disclosed techniques (e.g. a COBAN app offered by COBAN Technologies, Inc., in Houston, Tex. (http//www.cobantech.com)). Such embodiments allow for convenient direct upload and viewing of desired data files by users on the go.
In light of the principles and example embodiments described and illustrated herein, it will be recognized that the example embodiments may be modified in arrangement and detail without departing from such principles. Also, the foregoing discussion has focused on particular embodiments, but other configurations are also contemplated. In particular, even though expressions such as “in one embodiment,” “in another embodiment,” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the invention to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments. As a rule, any embodiment referenced herein is freely combinable with any one or more of the other embodiments referenced herein, and any number of features of different embodiments are combinable with one another, unless indicated otherwise.
Similarly, although example processes have been described with regard to particular operations performed in a particular sequence, numerous modifications might be applied to those processes to derive numerous alternative embodiments of the present invention. For example, alternative embodiments may include processes that use fewer than all of the disclosed operations, processes that use additional operations, and processes in which the individual operations disclosed herein are combined, subdivided, rearranged, or otherwise altered.
This disclosure may include descriptions of various benefits and advantages that may be provided by various embodiments. One, some, all, or different benefits or advantages may be provided by different embodiments. In view of the wide variety of useful permutations that may be readily derived from the example embodiments described herein, this detailed description is intended to be illustrative only, and should not be taken as limiting the scope of the invention. What is claimed as the invention, therefore, are all implementations that come within the scope of the following claims, and all equivalents to such implementations.
This application is a Continuation-in-Part of, and claims priority to, U.S. patent application Ser. No. 14/715,742, filed May 19, 2015 and entitled “Cloud Information Storage, Access, and Security”, currently pending.
Number | Date | Country | |
---|---|---|---|
62044139 | Aug 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14715742 | May 2015 | US |
Child | 15467924 | US |