This disclosure relates generally to a wireless programmable microphone apparatus including an internal storage drive which may be configured for data security and integrity and/or for self-contained application execution. More particularly, but not by way of limitation, this disclosure relates to a wireless programmable microphone including an internal storage device that contains a suite of software applications that are pre-configured to execute without requiring “installation” on a computer system prior to execution.
According to a first aspect of the invention, a portable recording device is disclosed. The portable recording device includes, in some embodiments, a microphone, a storage device, and one or more processors communicatively coupled to the microphone and the storage device. The storage device may be configured to store one or more pre-configured applications stored in the flash memory area that are configured for self-contained execution from the storage device. The self-contained execution from the storage device refers to the execution of the one or more pre-configured applications utilizing execution information only from the flash memory storage area. The execution information includes reference information based on a location address assigned to the storage device as a result of connecting the portable recording device to a computer system or computer device. The one or more processors may be further configured to simultaneously record captured audio and metadata information and wirelessly stream the captured audio and metadata information to another device.
In a second aspect of the invention, the self-contained application storage drive may be configured as a secure storage drive. The secure storage drive may include a first portion of firmware instructions pertaining to access to the secure storage drive. The first portion of firmware instructions have access to unhide information stored on the secure storage drive. The unhide information pertains to unhiding the secure storage drive to make it visible to an operating system that has attained access to the secure storage drive. The secure storage drive also has a second portion of firmware instructions pertaining to access to the flash memory storage area of the secure storage drive. The data access controller of the secure storage drive is further configured to utilize the first and second portions of firmware instructions (which may be combined into a single set of firmware instructions) to control access to the secure storage drive and the flash memory storage area. The first portion of firmware instructions comprise instructions that initiate execution upon connection of the portable recording device and thus the secure storage drive to a computer system or computer device and block functional connection of the secure storage drive to the computer system or computer device unless the computer system or computer device provides proper authentication information. The proper authentication information is checked to make sure it properly compares to the unhide information (e.g., may be a subset or superset of unhide information). Upon receipt of proper authentication information, the first portion of firmware instructions allow functional connection of the secure storage drive to the computer device and allow the second portion of firmware instructions to control access requests from the computer device (e.g., operating system of computer device) to the flash memory storage area.
Other aspects of the embodiments described herein will become apparent from the following description and the accompanying drawings, illustrating the principles of the embodiments by way of example only.
It being understood that the figures presented herein should not be deemed to limit or define the subject matter claimed herein, the applicants' disclosure may be understood by reference to the following description taken in conjunction with the accompanying drawings, in which like reference numerals identify like elements.
Certain terms are used throughout the following description and claims to refer to particular system components and configurations. As one skilled in the art will appreciate, the same component may be referred to by different names. This document does not intend to distinguish between components that differ in name but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . ” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device couples to a second device, that connection may be through a direct connection, or through an indirect connection via other devices and connections.
As used throughout this disclosure the terms “computer device” and “computer system” will both be used to refer to an apparatus that may be used in conjunction with disclosed embodiments of connectable storage drives and self-contained removable storage devices. As used herein, a computer device may be thought of as having a subset of functionalities as compared to a computer system. That is, a computer device may refer to a special purpose processor-based device such as a digital video surveillance system primarily configured for executing a limited number of applications. A computer system may more generally refer to a general purpose computer such as a laptop, workstation, or server which may be configured by a user to run any number of off the shelf or specially designed software applications. Computer systems and computer devices will generally interact with disclosed storage drives included in embodiments of the disclosed portable recording device in the same or similar ways. It should be noted that a computer device may be configured with hardware that would only support a subset of all possible self-contained storage devices but will function properly in conjunction with a self-contained storage device that only utilizes hardware available on that computer device.
This disclosure also refers to storage devices and storage drives interchangeably. In general, a storage device/drive represents a medium accessible by a computer to store data and executable instructions. Also, throughout this disclosure reference will be made to “plugging in” a storage drive. It is noted that “plugging in” a storage drive is just one way to connect a storage drive to a computer device/system. This disclosure is not intended to be limited to drives that physically “plug in” and disclosed embodiments are also applicable to devices that are “connected” to a computer device or computer system. For example devices may be connected by using a cable or by connecting using a computer bus. Additionally, references to “removable” storage are analogous to plugging-in/unplugging a device, connecting/disconnecting cabled access to a device, and/or establishing/disconnecting networked access to a device or storage area on a network (either wired or wireless).
The terms “hidden” and “unhidden,” when referring to a storage device, are used to describe accessibility of the storage device from a connected computer device or computer system. Hidden means that the operating system of the computer system cannot access, alter, or erase any data on the storage device, at least in part, because the operating system will be unaware of the existence of the storage device. Unhidden refers to a situation where a secure storage drive configured according to embodiments of this disclosure has been properly authenticated after connection to a computer system and is visible to the operating system of the computer system. Once “unhidden” the secure storage drive may interact with the operating system of the computer system in a standard manner until such time as the secure storage drive is disconnected. Upon being disconnected the secure storage drive may return to its default “hidden” state and remain inaccessible until it is again connected and “unhidden” via proper authentication.
This disclosure also refers to a “self-contained” storage device that is pre-configured with one or more applications such that the one or more applications may execute and interact with each other without requiring “installation” on a computer system. That is, the one or more applications are pre-configured for “self-contained” execution and do not require updates to a computer registry or installation of files prior to execution. Applications on a “self-contained” storage device may be pre-configured with referential pointers that are resolved at run-time to obtain access to required components or other applications for coordinated execution.
The disclosed “self-contained” storage device may be integrated or attached to a portable recording device/apparatus such as a programmable wireless microphone and allow for storage of data captured by the portable recording apparatus. Also, when connected to a computer device or computer system, program information stored on the storage device may be used to execute applications on the computer device or system via self-contained execution as described throughout this Specification. The terms “device” and “apparatus” are used interchangeably throughout this disclosure when referring to a device or apparatus incorporating the disclosed self-contained storage device.
The foregoing description of the figures is provided for the convenience of the reader. It should be understood, however, that the embodiments are not limited to the precise arrangements and configurations shown in the figures. Also, the figures are not necessarily drawn to scale, and certain features may be shown exaggerated in scale or in generalized or schematic form, in the interest of clarity and conciseness. The same or similar parts may be marked with the same or similar reference numerals.
While various embodiments are described herein, it should be appreciated that the present invention encompasses many inventive concepts that may be embodied in a wide variety of contexts. The following detailed description of exemplary embodiments, read in conjunction with the accompanying drawings, is merely illustrative and is not to be taken as limiting the scope of the invention, as it would be impossible or impractical to include all of the possible embodiments and contexts of the invention in this disclosure. Upon reading this disclosure, many alternative embodiments of the present invention will be apparent to persons of ordinary skill in the art. The scope of the invention is defined by the appended claims and equivalents thereof.
Illustrative embodiments are described below in the context of a surveillance system for a police car and other computer devices that support collection and maintenance of video and audio evidence for law enforcement. Examples of such computer devices include, but are not limited to, portable digital cameras, self-contained application storage drives, digital video cameras, and digital audio microphones. Uses of the disclosed pre-configured storage device (e.g., a self-contained storage drive or secure self-contained storage drive included in a programmable wireless microphone) for securing data and maintaining data integrity exist beyond the field of law enforcement and this context is illustrative and not intended to be limiting in any manner. Implementations relating to both a “secure” self-contained storage drive/device and a self-contained standard (as opposed to secure) storage drive are further discussed below. In the interest of clarity, not all features of an actual implementation are described for every embodiment disclosed in this specification. In the development of any actual embodiment, numerous implementation-specific decisions may need to be made to achieve the design-specific goals, which may vary from one implementation to another. It will be appreciated that such a development effort, while possibly complex and time-consuming, would nevertheless be a routine undertaking for persons of ordinary skill in the art having the benefit of this disclosure.
Referring to
PCD 105 may be included in a computing system such as computing device 100 and be programmed to perform methods in accordance with this disclosure. PCD 105 comprises a processing unit (PU) 115, input-output (I/O) interface 110 and memory 120. PU 115 may include any programmable controller device including, for example, the Intel Core®, Pentium® and Celeron® processor families from Intel and the Cortex® and ARM® processor families from ARM® (INTEL® CORE®, PENTIUM® and CELERON® are registered trademarks of the Intel Corporation). CORTEX® and ARM® are registered trademarks of ARM Holdings. Memory 120 may include one or more memory modules and comprise random access memory (RAM), read only memory (ROM), programmable read only memory (PROM), programmable read-write memory, and solid state memory. It will also be recognized that PU 115 may further include some internal memory including, for example, cache memory.
Various changes in the materials, components, circuit elements, as well as in the details of the illustrated systems, devices and below described operational methods are possible without departing from the scope of the claims herein. For instance, acts in accordance with disclosed functional capabilities may be performed by a PCD (e.g., 105) executing instructions organized into one or more modules (comprised of computer program code or instructions). A PCD (e.g., 105) may include single computer processor (e.g., PU 115), a plurality of computer processors coupled by a communications link (e.g., bus or network) or one or more special purpose processors (e.g., a digital signal processor (DSP)). Such a PCD (e.g., 105) may be one element in a larger data processing system such as a general purpose or special purpose computer system. Storage media, as embodied in storage devices such as PSD 145, memory (e.g., 120) internal to PCD 105, or storage media connected via expansion port 130 are suitable for tangibly embodying computer program instructions. Storage media may include, but not be limited to: magnetic disks (fixed, floppy, and removable) and tape; optical media such as CD-ROMs and digital video disks (DVDs); and semiconductor memory devices such as Electrically Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Programmable Gate Arrays, and flash devices. These types of storage media are also sometimes referred to as computer readable medium or program storage devices. PCD 105 and/or computer device 100 may also include an expansion port 130 for connecting additional devices or storage media (e.g., plug-in storage drives 150 and 155 of
Referring now to
Referring now to
As explained above, a device driver on a computer device such as computer device 100 may be augmented or replaced to include additional or altered instructions to provide the disclosed unhide information. The device driver may be altered by changing instructions internal to the original device driver, by providing an altered dynamic load library (DLL), by installing a new device driver, or by many other implementation specific methods. This disclosure does not confine itself to any one method of implementation for updating a computer system to have a device driver enabled to provide the appropriate unhide information. Additionally, augmentation of a device driver on a computer device may include providing multiple different combinations and permutations of unhide information for a single computer device. That is, a single computer device may be configured to be able to access and unhide a plurality of different secure storage drives based on properly providing any required secondary authentication information (e.g., UID, GID).
Referring now to
According to some disclosed embodiments, the secure storage drive remains hidden unless the computer system issues a special unhide key (via a device driver) to unhide the storage volume. For example, to unhide the portion of the storage device containing data readable by an operating system of the computer device (e.g., computer device 100 of
The hidden secure removable storage device and associated methods of operation described above with reference to
Referring now to
Referring now to
Referring now to
At block 820 each installation process may update the registry and storage drive (e.g., internal storage device) associated with the computer device. Block 825 indicates that after all identified applications have been installed on the computer device a user may attempt to initiate application execution. If all applications and application components properly completed their installation process without detecting or causing conflicts then the applications may function properly (the one or more applications execute correctly) using the installed components and registry for additional run-time information as indicated at block 830.
Referring now to
Referring now to
With the above understanding of different embodiments of secure storage drives and self-contained application storage devices, we now discuss embodiments of portable cameras (e.g., body worn cameras 1050) to assist in comprehensive surveillance capabilities for companies or agencies, such as law enforcement. Note that disclosed embodiments of portable cameras are not limited to law enforcement and may be utilized by anyone desiring a portable surveillance system. For example, assistance personal at a retail outlet may be equipped with a portable camera to capture potential shop lifting evidence, or to record information for potential liability cases such as work related accidents, and so on. Many different uses of portable cameras configured according to the disclosed embodiments are envisioned.
A portable body worn camera (e.g., 1050) may have different requirements than an in car surveillance system for many reasons. For example, a body worn camera 1050 may not always have access to an additional power source (e.g., car battery) and will likely be substantially powered by a battery pack. In some embodiments, the disclosed portable camera 1050 may include a removable battery pack power source and an internal secondary “back up” power source. The internal power source will likely not be able to maintain functionality for a long time period and may provide enough time to allow the portable camera (e.g., 1050) to maintain operation (and data integrity) while a battery pack is exchanged for another battery pack, for example. Additionally, a body worn camera 1050 may have different size and weight constraints as compared to an in car surveillance system. These are just two examples of the many design choices that may be considered when distinguishing body worn cameras 1050 from other types of surveillance equipment and systems.
Referring now to
Disclosed embodiments of a body worn camera 1050 may include one or more of the following additional features. A High Definition (HD) camera supporting different resolution recording modes (e.g., 4K, 1080P, 720P, etc.). A Liquid Crystal Display (LCD) or a Light Emitting Diode (LED) display along with or in addition to LED light indicators to indicate operational status of body worn camera 1050. An internal storage drive (optionally configured as the above discussed self-contained storage device and/or secure storage drive (e.g., 250, 255 of
Authentication of body worn camera 1050 and access to any internal recordings may require authentication of a secure storage drive (e.g., 250, 255 if so configured) and/or authentication of a user to the body worn camera 1050 device itself. Authentication of body worn camera 1050 may be accomplished using wireless communication interfaces or by physical contact with (e.g., cable connection, pogo pins, sync contacts, etc.) another previously authenticated device (e.g., 601). Authentication to body worn camera 1050 may also be assisted via, or be part of, a single sign-on process. The single sign-on process may be initiated on a different device and communicated to body worn camera 1050 via one if its communication interfaces (wired or wireless). Alternatively, a previously authenticated body worn camera 1050 may assist in authenticating a user to another device using a similar single sign-on process. That is, body worn camera 1050 may be an initiator or a recipient device in a single sign-on process. Communication interfaces for the disclosed body worn camera 1050 may include one or more of integrated broadband 3G/4G, Wi-Fi, Bluetooth, and RFID/NFC. Note that each of these interfaces, in particular, (radio frequency identification) RFID and (near field communication) NFC interfaces may be used for data exchange, device authentication, and/or device control. By using NFC (or short range RFID) secure authentication may automatically take place between two devices based on those two devices being brought within proximity of each other. One or more of video, audio, metadata, control communication, and/or streaming, may be configured to function over any available and compatible wireless communication interface in a bidirectional manner. That is, body worn camera 1050 may be remote controlled from another device or act as a remote control for another device (e.g., mobile surveillance system 601). As discussed in more detail below, disclosed embodiments of a body worn camera 1050 may include docking ports (see
Other ports on a body worn camera 1050 may include charging ports/plugs and vehicle or office docking ports to plug into a docking station (e.g., docking station 1100 of
Referring now to
Docking station 1100 may have integrated interfaces to portable camera 1050 such as, USB, wired Ethernet or wireless network, as well as interface ports for battery charging. Docking station 1000 may also contain: a CPU and be configured as a computer device (see
Embodiments of docking station 1100 may be configured to interface with tablets or smart phones as a user interface to provide for full remote functionality. As shown in
Docking station 1100 may also have an internal storage device to facilitate fast off-load storage to facilitate a download/forward process for audio/video and data captured on the portable device. For example, the user may place the wearable or portable recording device (e.g., body worn camera 1050 or programmable wireless microphone 1350) into docking station 1100 and docking station 1100 offloads the data to the local onboard storage drive (not shown) which can immediately (or based on a timer) upload that information to a server (e.g., back office server or cloud storage). Uploads could be prioritized based on many different attributes such as time, size, event type, priority, and so on. Docking station 1100 may also have an integrated locking mechanism for one or more of the uploading/charging ports/cradles (1115). The docking station 1100 may be configured to control the locking mechanism to hold or release the wearable device in order to prevent the user from taking it out during uploading/downloading, or to make sure that only the recently “checked out” device is removed, for example.
The touch screen display 1110 of
Referring now to
At block 1225, the officer authenticates to a mobile surveillance system. The storage device is plugged in (e.g., connected by connecting the portable device (e.g., 1050, 1350)) to the mobile surveillance system at block 1230. Flow continues to block 1235 where the storage device of the portable device (e.g., 1050, 1350), if a secure storage device (e.g., 250, 255), is unhidden. Clearly, a secure storage drive will only become unhidden if the mobile surveillance system is configured to properly authenticate to the secure storage drive of the portable device (e.g., 1050, 1350). Authentication requires the mobile surveillance system be pre-configured to access this particular secure storage drive using “unhide information” as described above and may optionally only unhide after a second check that a proper officer has authenticated to the mobile surveillance system. That is, both the secure storage drive in the portable recording device (e.g., 1050, 1350) is associated with a proper surveillance system (e.g., 601), and the authenticated user will be validated as a proper user prior to allowing any access to the secure storage drive of the portable device (e.g., 1050, 1350) from the mobile surveillance system. Thus, as an example, Officer “Joe Smith” is authenticated to the mobile surveillance system and the mobile surveillance system is the one in patrol car 54, that Officer Smith should be using for his shift. Such increased authentication methods may assist in compliance with chain of custody of evidence requirements for gathering and maintenance of evidence.
At block 1240, as the officer performs his shift duties (e.g., goes on patrol, etc.) the mobile surveillance system records and stores evidence and surveillance data onto the storage device of the portable device (e.g., 1050, 1350). During the shift, all data recorded on the storage device may be associated with the officer for audit tracking purposes as indicated at block 1245. For example, a metadata file may be used to “mark” any recorded data with officer's ID, event type, date/time, GPS location, etc. Block 1250 represents actions that may take place at the end of a shift, for example. After a shift is completed and the officer and mobile surveillance system return to the police station, recorded data may be securely (for example, but not limited to, by data encryption) uploaded wirelessly to a back office system at the police station. Securely uploaded, as used here, indicates that the recorded data will be uploaded in a manner as to maintain its association with the officer and maintain chain of custody of evidence requirements as well as any other type of security regarding the wireless network, etc. As an alternative to wireless upload, the officer may remove (e.g., disconnect) the portable device (e.g., 1050, 1350) and relocate the storage device to the same or a different docking station 1100 for upload at the police station. Clearly, a different docking station 1100 would also need to be properly configured to access the storage device of a portable device (e.g., 1050, 1350) if it is a secure storage device (e.g., 250, 255). At block 1255, the officer may “check in” the storage device so as to allow a different officer to use it on a subsequent shift, for example by using a GUI interface to docking station 1100. Note that some law enforcement agencies require a two-factor authentication for access to data. Validating “unhidden information” regarding both the storage device and the authenticated officer (e.g., both the association with the surveillance system of patrol car 54 and confirming Officer Smith is logged into that system) is one example of two-factor authentication.
Referring now to
In some embodiments, programmable buttons (e.g., 1320, 1325, and 1330) may be configured to control functional characteristics of programmable wireless microphone 1350. Programmable buttons (e.g., 1320, 1325, and 1330) may optionally initiate sending control information via one or more wireless communication interfaces to one or more associated surveillance system devices (e.g., mobile surveillance system 601). Additionally the multiple programmable buttons (e.g., 1320, 1325, and 1330) may be configured to support features such as mute, trigger recording on the backseat camera, blackout the display, lock the system, trigger emergency alert, voice recorder, etc. Programmable wireless microphone 1350 may also be configured to receive control commands via its wireless communication interfaces. Thus, a bi-directional communication link may be established between programmable wireless microphone 1350 and other surveillance system devices. Of course, bi-directional communication links may be established to allow communication between programmable wireless microphone 1350 and headquarters, command centers, other vehicles etc. Communications to distant locations may be facilitated by using another device (e.g., in car system 601, cell tower, etc.) as an intermediary for relaying the transmissions.
Authentication of programmable wireless microphone 1350 and access to any internal recordings may require authentication of a secure storage drive (e.g., 250, 255 if so configured) and/or authentication of a user to programmable wireless microphone 1350 itself.
Authentication of programmable wireless microphone 1350 may be accomplished using wireless communication interfaces or by physical contact with (e.g., cable connection, pogo pins, sync contacts, etc.) another previously authenticated device (e.g., 601). Authentication to programmable wireless microphone 1350 may also be assisted via, or be part of, a single sign-on process. The single sign-on process may be initiated on a different device and communicated to programmable wireless microphone 1350 via one if its communication interfaces (wired or wireless). Alternatively, a previously authenticated programmable wireless microphone 1350 may assist in authenticating a user to another device using a similar single sign-on process. That is, programmable wireless microphone 1350 may be an initiator or a recipient device in a single sign-on process. Communication interfaces for programmable wireless microphone 1350 may include one or more of integrated broadband 3G/4G, Wi-Fi, Bluetooth, and RFID/NFC. Note that each of these interfaces, in particular, (radio frequency identification) RFID and (near field communication) NFC interfaces may be used for data exchange, device authentication, and/or device control. One or more of audio, metadata, control communication, and/or streaming, may be configured to function over any available and compatible wireless communication interface in a bidirectional manner. That is, programmable wireless microphone 1350 may be remote controlled from another device or act as a remote control for another device (e.g., mobile surveillance system 601). As discussed in more detail above, disclosed embodiments of programmable wireless microphone 1350 may include docking ports (see
As briefly mentioned above, programmable wireless microphone 1350 may include an internal (or plugged in) storage drive (possibly secure storage drive e.g., 250, 255) to store captured audio information. Programmable wireless microphone 1350 may be configured to automatically stream captured audio information and associated metadata to another device (e.g., mobile surveillance system 601) using any of its configured wireless interfaces and may simultaneously record and stream. Alternatively, programmable wireless microphone 1350 may only store collected information locally when streaming capability is not available or determined to be unreliable (e.g., out of range, bad connection, etc.). Data stored locally may be time stamped using an internal clock or information from a GPS and later synchronized with other recording devices. GPS may also provide location data that may be used to coordinate data and map based search in addition to the aforementioned time synchronization. Programmable wireless microphone 1350 may be configured to have an internal pre-record buffer either stored on an associated storage drive or stored in additional internal memory. A user or administrator may define a record duration for the pre-record buffer and information in the memory associated with the pre-record buffer may be utilized using a circular queue mechanism. Programmable wireless microphone 1350 may also have an option to store audio only local recordings such as voice memos initiated by a user. Local recordings may also be reviewed using an ear phone port (not shown) for example. It is noted that capabilities of programmable wireless microphone 1350 and body worn camera 1050 may be integrated into a single comprehensive device configured to perform some or all of the functions described for each device above.
With the above understanding of different disclosed embodiments, an example scenario of use is presented here. This example is not intended to be limiting in any manner and is provided to illustrate a context for using and benefiting from the many different possible aspects of a self-contained storage drive integrated into a portable camera (e.g., 1050) or a wireless programmable microphone (e.g., 1350) according to disclosed embodiments.
It is a common dilemma for small law enforcement agencies adopting in-car video systems and/or portable camera surveillance systems to have to choose between manageability and technology complexity. A server based solution may require experienced computer technicians to maintain proper operation. In contrast, a non-server based solution may become challenging for maintaining system configuration, video search capabilities, and evidence life-cycle maintenance. A self-contained, removable storage device which stores a software application (or application suite), a media player, firmware/software updates for the mobile audio and/or video recording systems, and actual recorded audio and/or video or related metadata from the mobile audio and/or video recording systems (e.g., mobile surveillance system, body worn camera (e.g., 1050), remote audio recording radio/microphone 1350) is disclosed herein. This self-contained removable device may allow small police departments to utilize current technologies at a reduced overall cost. For example, a small police department utilizing self-contained storage devices may have benefits previously available only from server based solutions without the need to implement a server based solution or employ trained computer technicians. The software application(s) stored on the removable storage device may have any number of the following attributes: a) self-contained such that nothing is required to be installed on the computer device to run applications from the removable storage device; b) ability to manage configuration information of mobile video and/or audio recording devices used to store recorded media, related metadata, and audit logs; c) capable of moving recorded audio and/or video and snapshot images (e.g. digital photographs) to other storage areas securely; and d) capable of building catalogues for searching and indexing stored recordings (the recordings stored on the computer device or accessible via a network available to the computer device). The media player of the self-contained storage device allows for playing of available stored evidence. The disclosed firmware and/or software process allows for automatic maintenance of mobile surveillance devices, for example. The configuration information of the self-contained storage device may assist in maintaining chain of custody of evidence and authentication mechanisms including user logon information, device identity, and device configuration. All of the above capabilities of a self-contained storage device may be utilized by small and large police departments to streamline maintenance and upgrades for their fleet of vehicles containing mobile surveillance systems. Furthermore, while examples herein refer to police departments, it should be understood that the disclosure envisions broad applicability to any entity (e.g. FBI, CIA, DEA, Interpol, Scotland Yard etc.) involved in law enforcement activities which include, but are not limited to, functions that require maintenance of chain of custody of evidence.
In light of the principles and example embodiments described and illustrated herein, it will be recognized that the example embodiments can be modified in arrangement and detail without departing from such principles. Also, the foregoing discussion has focused on particular embodiments, but other configurations are also contemplated. In particular, even though expressions such as “in one embodiment,” “in another embodiment,” or the like are used herein, these phrases are meant to generally reference embodiment possibilities, and are not intended to limit the invention to particular embodiment configurations. As used herein, these terms may reference the same or different embodiments that are combinable into other embodiments. As a rule, any embodiment referenced herein is freely combinable (unless otherwise stated) with any one or more of the other embodiments referenced herein, and any number of features of different embodiments are combinable with one another, unless indicated otherwise.
Similarly, although example processes have been described with regard to particular operations performed in a particular sequence, numerous modifications may be applied to those processes to derive numerous alternative embodiments of the present invention. For example, alternative embodiments may include processes that use fewer than all of the disclosed operations, processes that use additional operations, and processes in which the individual operations disclosed herein are combined, subdivided, rearranged, or otherwise altered.
This disclosure may include descriptions of various benefits and advantages that may be provided by various embodiments. One, some, all, or different benefits or advantages may be provided by different embodiments.
In view of the wide variety of useful permutations that may be readily derived from the example embodiments described herein, this detailed description is intended to be illustrative only, and should not be taken as limiting the scope of the invention. What is claimed as the invention, therefore, are all implementations that come within the scope of the following claims, and all equivalents to such implementations.
This application is a continuation-in-part of U.S. patent application Ser. No. 14/588,139, filed Dec. 31, 2014, entitled, “Hidden Plug-in Storage Drive for Data Integrity,” by Hung C. Chang, which is incorporated herein by reference for all applicable purposes. This application claims the benefit of, and priority to, U.S. Provisional Application No. 62/044,139, filed Aug. 29, 2014, and entitled, “Compact Multi-Function DVR with Multiple Integrated Wireless Data Communication Devices,” which is incorporated herein by reference. This application is also related to U.S. patent application Ser. No. 14/593,722, entitled, “Self-contained Storage Device for Self-contained Application Execution,” by Allan Chen, et al., and U.S. patent application Ser. No. 14/593,853, entitled, “Portable Camera Apparatus and System for Integrated Surveillance System Devices,” by Hung C. Chang, et al., each filed Jan. 9, 2015 and incorporated herein by reference for all applicable purposes.
Number | Name | Date | Kind |
---|---|---|---|
4344184 | Edwards | Aug 1982 | A |
4543665 | Sotelo et al. | Sep 1985 | A |
4590614 | Erat | May 1986 | A |
4910795 | McCowen et al. | Mar 1990 | A |
5012335 | Cohodar | Apr 1991 | A |
5111289 | Lucas et al. | May 1992 | A |
5408330 | Squicciarini et al. | Apr 1995 | A |
5477397 | Naimpally et al. | Dec 1995 | A |
5613032 | Cruz et al. | Mar 1997 | A |
5724475 | Kirsten | Mar 1998 | A |
5815093 | Kikinis | Sep 1998 | A |
5841978 | Rhoads | Nov 1998 | A |
5862260 | Rhoads | Jan 1999 | A |
5926218 | Smith | Jul 1999 | A |
5946343 | Schotz et al. | Aug 1999 | A |
5970098 | Herzberg | Oct 1999 | A |
6002326 | Turner | Dec 1999 | A |
6009229 | Kawamura | Dec 1999 | A |
6028528 | Lorenzetti et al. | Feb 2000 | A |
6038257 | Brusewitz et al. | Mar 2000 | A |
6122403 | Rhoads | Sep 2000 | A |
6141611 | Mackey et al. | Oct 2000 | A |
6163338 | Johnson et al. | Dec 2000 | A |
6175860 | Gaucher | Jan 2001 | B1 |
6275773 | Lemelson et al. | Aug 2001 | B1 |
6298290 | Abe et al. | Oct 2001 | B1 |
6346965 | Toh | Feb 2002 | B1 |
6411874 | Morgan et al. | Jun 2002 | B2 |
6421080 | Lambert | Jul 2002 | B1 |
6424820 | Burdick et al. | Jul 2002 | B1 |
6462778 | Abram et al. | Oct 2002 | B1 |
6505160 | Levy et al. | Jan 2003 | B1 |
6510177 | De Bonet et al. | Jan 2003 | B1 |
6518881 | Monroe | Feb 2003 | B2 |
6624611 | Kirmuss | Sep 2003 | B2 |
6778814 | Koike | Aug 2004 | B2 |
6788338 | Dinev et al. | Sep 2004 | B1 |
6788983 | Zheng | Sep 2004 | B2 |
6789030 | Coyle et al. | Sep 2004 | B1 |
6791922 | Suzuki | Sep 2004 | B2 |
6825780 | Saunders et al. | Nov 2004 | B2 |
6831556 | Boykin | Dec 2004 | B1 |
7010328 | Kawasaki et al. | Mar 2006 | B2 |
7091851 | Mason et al. | Aug 2006 | B2 |
7119832 | Blanco et al. | Oct 2006 | B2 |
7120477 | Huang | Oct 2006 | B2 |
7155615 | Silvester | Dec 2006 | B1 |
7167519 | Comaniciu et al. | Jan 2007 | B2 |
7190882 | Gammenthaler | Mar 2007 | B2 |
7231233 | Gosieski, Jr. | Jun 2007 | B2 |
7272179 | Siemens et al. | Sep 2007 | B2 |
7317837 | Yatabe et al. | Jan 2008 | B2 |
7356473 | Kates | Apr 2008 | B2 |
7386219 | Ishige | Jun 2008 | B2 |
7410371 | Shabtai et al. | Aug 2008 | B2 |
7414587 | Stanton | Aug 2008 | B2 |
7428314 | Henson | Sep 2008 | B2 |
7515760 | Sai et al. | Apr 2009 | B2 |
7542813 | Nam | Jun 2009 | B2 |
7551894 | Gerber | Jun 2009 | B2 |
7554587 | Shizukuishi | Jun 2009 | B2 |
7618260 | Daniel et al. | Nov 2009 | B2 |
7631195 | Yu et al. | Dec 2009 | B1 |
7688203 | Rockefeller et al. | Mar 2010 | B2 |
7693289 | Stathem et al. | Apr 2010 | B2 |
7768548 | Silvernail et al. | Aug 2010 | B2 |
7778601 | Seshadri et al. | Aug 2010 | B2 |
7792189 | Finizio et al. | Sep 2010 | B2 |
7818078 | Iriarte | Oct 2010 | B2 |
7835530 | Avigni | Nov 2010 | B2 |
7868912 | Venetianer et al. | Jan 2011 | B2 |
7877115 | Seshadri et al. | Jan 2011 | B2 |
7974429 | Tsai | Jul 2011 | B2 |
7995652 | Washington | Aug 2011 | B2 |
8068023 | Dulin et al. | Nov 2011 | B2 |
8081214 | Vanman et al. | Dec 2011 | B2 |
8086277 | Ganley et al. | Dec 2011 | B2 |
8121306 | Cilia et al. | Feb 2012 | B2 |
8126276 | Bolle et al. | Feb 2012 | B2 |
8126968 | Rodman et al. | Feb 2012 | B2 |
8139796 | Nakashima et al. | Mar 2012 | B2 |
8144892 | Shemesh et al. | Mar 2012 | B2 |
8145134 | Henry et al. | Mar 2012 | B2 |
8150089 | Segawa et al. | Apr 2012 | B2 |
8154666 | Mody | Apr 2012 | B2 |
8166220 | Ben-Yacov et al. | Apr 2012 | B2 |
8174577 | Chou | May 2012 | B2 |
8195145 | Angelhag | Jun 2012 | B2 |
8208024 | Dischinger | Jun 2012 | B2 |
8228364 | Cilia | Jul 2012 | B2 |
8230149 | Long et al. | Jul 2012 | B1 |
8253796 | Renkis | Aug 2012 | B2 |
8254844 | Kuffner et al. | Aug 2012 | B2 |
8260217 | Chang et al. | Sep 2012 | B2 |
8264540 | Chang et al. | Sep 2012 | B2 |
8270647 | Crawford et al. | Sep 2012 | B2 |
8289370 | Civanlar et al. | Oct 2012 | B2 |
8300863 | Hendriksen et al. | Oct 2012 | B2 |
8311549 | Chang | Nov 2012 | B2 |
8311983 | Guzik | Nov 2012 | B2 |
8358980 | Tajima et al. | Jan 2013 | B2 |
8380131 | Chiang | Feb 2013 | B2 |
8422944 | Flygh et al. | Apr 2013 | B2 |
8446469 | Blanco et al. | May 2013 | B2 |
8489065 | Green et al. | Jul 2013 | B2 |
8489151 | Van Engelen et al. | Jul 2013 | B2 |
8497940 | Green et al. | Jul 2013 | B2 |
8554145 | Fehr | Oct 2013 | B2 |
8612708 | Drosch | Dec 2013 | B2 |
8630908 | Forster | Jan 2014 | B2 |
8661507 | Hesselink et al. | Feb 2014 | B1 |
8707392 | Birtwhistle et al. | Apr 2014 | B2 |
8780199 | Mimar | Jul 2014 | B2 |
9041803 | Chen et al. | May 2015 | B2 |
20020051061 | Peters et al. | May 2002 | A1 |
20020135679 | Scaman | Sep 2002 | A1 |
20030052970 | Dodds et al. | Mar 2003 | A1 |
20030080878 | Kirmuss | May 2003 | A1 |
20030081127 | Kirmuss | May 2003 | A1 |
20030081935 | Kirmuss | May 2003 | A1 |
20030095688 | Kirmuss | May 2003 | A1 |
20030103140 | Watkins | Jun 2003 | A1 |
20030151663 | Lorenzetti et al. | Aug 2003 | A1 |
20030197629 | Saunders et al. | Oct 2003 | A1 |
20040008255 | Lewellen | Jan 2004 | A1 |
20040051793 | Tecu et al. | Mar 2004 | A1 |
20040146272 | Kessel et al. | Jul 2004 | A1 |
20040177253 | Wu et al. | Sep 2004 | A1 |
20050007458 | Benattou | Jan 2005 | A1 |
20050083404 | Pierce et al. | Apr 2005 | A1 |
20050088521 | Blanco et al. | Apr 2005 | A1 |
20050122397 | Henson et al. | Jun 2005 | A1 |
20050154907 | Han et al. | Jul 2005 | A1 |
20050185936 | Lao et al. | Aug 2005 | A9 |
20050243171 | Ross, Sr. et al. | Nov 2005 | A1 |
20050286476 | Crosswy et al. | Dec 2005 | A1 |
20060055521 | Blanco et al. | Mar 2006 | A1 |
20060072672 | Holcomb et al. | Apr 2006 | A1 |
20060077256 | Silvemail et al. | Apr 2006 | A1 |
20060078046 | Lu | Apr 2006 | A1 |
20060130129 | Dai et al. | Jun 2006 | A1 |
20060133476 | Page et al. | Jun 2006 | A1 |
20060165386 | Garoutte | Jul 2006 | A1 |
20060270465 | Lee et al. | Nov 2006 | A1 |
20060274116 | Wu | Dec 2006 | A1 |
20070064108 | Haler | Mar 2007 | A1 |
20070086601 | Mitchler | Apr 2007 | A1 |
20070111754 | Marshall et al. | May 2007 | A1 |
20070124292 | Kirshenbaum et al. | May 2007 | A1 |
20070217761 | Chen et al. | Sep 2007 | A1 |
20080005472 | Khalidi et al. | Jan 2008 | A1 |
20080030782 | Watanabe | Feb 2008 | A1 |
20080129825 | DeAngelis et al. | Jun 2008 | A1 |
20080165250 | Ekdahl et al. | Jul 2008 | A1 |
20080186129 | Fitzgibbon | Aug 2008 | A1 |
20080208755 | Malcolm | Aug 2008 | A1 |
20080303903 | Bentley et al. | Dec 2008 | A1 |
20090017881 | Madrigal | Jan 2009 | A1 |
20090074216 | Bradford et al. | Mar 2009 | A1 |
20090076636 | Bradford et al. | Mar 2009 | A1 |
20090195651 | Leonard et al. | Aug 2009 | A1 |
20090213902 | Jeng | Aug 2009 | A1 |
20100026809 | Curry | Feb 2010 | A1 |
20100030929 | Ben-Yacov et al. | Feb 2010 | A1 |
20100057444 | Cilia | Mar 2010 | A1 |
20100081466 | Mao | Apr 2010 | A1 |
20100131748 | Lin | May 2010 | A1 |
20100180051 | Harris | Jul 2010 | A1 |
20100274816 | Guzik | Oct 2010 | A1 |
20100287545 | Corbefin | Nov 2010 | A1 |
20100289648 | Ree | Nov 2010 | A1 |
20100302979 | Reunamaki | Dec 2010 | A1 |
20100309971 | Vanman et al. | Dec 2010 | A1 |
20110016256 | Hatada | Jan 2011 | A1 |
20110044605 | Vanman et al. | Feb 2011 | A1 |
20110142156 | Haartsen | Jun 2011 | A1 |
20110233078 | Monaco et al. | Sep 2011 | A1 |
20110234379 | Lee | Sep 2011 | A1 |
20110280143 | Li et al. | Nov 2011 | A1 |
20110280413 | Wu et al. | Nov 2011 | A1 |
20110299457 | Green, III et al. | Dec 2011 | A1 |
20120014534 | Bodley et al. | Jan 2012 | A1 |
20120078397 | Lee et al. | Mar 2012 | A1 |
20120163309 | Ma et al. | Jun 2012 | A1 |
20120173577 | Millar et al. | Jul 2012 | A1 |
20120266251 | Birtwhistle et al. | Oct 2012 | A1 |
20120307070 | Pierce | Dec 2012 | A1 |
20120310394 | Hoiydi | Dec 2012 | A1 |
20120310395 | Hoiydi | Dec 2012 | A1 |
20130201884 | Freda et al. | Aug 2013 | A1 |
20130223653 | Chang | Aug 2013 | A1 |
20130236160 | Gentile et al. | Sep 2013 | A1 |
20130242262 | Lewis | Sep 2013 | A1 |
20130251173 | Ejima et al. | Sep 2013 | A1 |
20130268357 | Heath | Oct 2013 | A1 |
20130339447 | Ervine | Dec 2013 | A1 |
20130346660 | Kwidzinski et al. | Dec 2013 | A1 |
20140078304 | Othmer | Mar 2014 | A1 |
20140092251 | Troxel | Apr 2014 | A1 |
20140143545 | McKeeman | May 2014 | A1 |
20140162598 | Villa-Real | Jun 2014 | A1 |
20140280584 | Ervine | Sep 2014 | A1 |
20140281498 | Bransom et al. | Sep 2014 | A1 |
20140297687 | Lin | Oct 2014 | A1 |
20150032535 | Li et al. | Jan 2015 | A1 |
Number | Date | Country |
---|---|---|
2907145 | May 2007 | CN |
101309088 | Nov 2008 | CN |
102355618 | Feb 2012 | CN |
102932703 | Feb 2013 | CN |
202957973 | May 2013 | CN |
103617005 | Mar 2014 | CN |
1148726 | Oct 2001 | EP |
1655855 | Oct 2006 | EP |
2107837 | Oct 2009 | EP |
2391687 | Nov 2004 | GB |
2003150450 | May 2003 | JP |
2005266934 | Sep 2005 | JP |
2009169922 | Jul 2009 | JP |
2012058832 | Mar 2012 | JP |
9738526 | Oct 1997 | WO |
0013410 | Mar 2000 | WO |
0021258 | Apr 2000 | WO |
0045587 | Aug 2000 | WO |
0072186 | Nov 2000 | WO |
02061955 | Aug 2002 | WO |
2004066590 | Aug 2004 | WO |
2004111851 | Dec 2004 | WO |
2005053325 | Jun 2005 | WO |
2005054997 | Jun 2005 | WO |
2007114988 | Oct 2007 | WO |
2009058611 | May 2009 | WO |
2009148374 | Dec 2009 | WO |
2012001143 | Jan 2012 | WO |
2012100114 | Jul 2012 | WO |
2012116123 | Aug 2012 | WO |
2013020588 | Feb 2013 | WO |
2013074947 | May 2013 | WO |
2013106740 | Jul 2013 | WO |
2013107516 | Jul 2013 | WO |
2013150326 | Oct 2013 | WO |
2014057496 | Apr 2014 | WO |
Entry |
---|
Office Action issued in U.S. Appl. No. 11/369,502 on Mar. 16, 2010. |
Office Action issued in U.S. Appl. No. 11/369,502 on Sep. 30, 2010. |
Office Action issued in U.S. Appl. No. 11/369,502 on Jul. 14, 2011. |
Office Action issued in U.S. Appl. No. 11/369,502 on Jan. 31, 2012. |
Examiner's Answer (to Appeal Brief) issued in U.S. Appl. No. 11/369,502 on Oct. 24, 2012. |
Office Action issued in U.S. Appl. No. 13/723,747 on Mar. 22, 2013. |
Office Action issued in U.S. Appl. No. 13/723,747 on Jun. 26, 2013. |
Office Action issued in U.S. Appl. No. 13/723,747 on Sep. 10, 2013. |
Advisory Action issued in U.S. Appl. No. 13/723,747 on Feb. 24, 2014. |
Office Action issued in U.S. Appl. No. 13/723,747 on Mar. 20, 2014. |
Office Action issued in U.S. Appl. No. 13/723,747 on Nov. 10, 2014. |
Notice of Allowance and Fees Due issued in U.S. Appl. No. 13/723,747 on Mar. 30, 2015. |
First Action Interview Pilot Program Pre-Interview Communication issued in U.S. Appl. No. 14/588,139 on May 14, 2015. |
Office Action issued in U.S. Appl. No. 14/593,722 on Apr. 10, 2015. |
Office Action issued in U.S. Appl. No. 14/593,853 on Apr. 20, 2015. |
PCT International Search Report and Written Opinion issued in Application No. PCT/US07/63485 on Feb. 8, 2008, 10 pages. |
Chapter 5: “Main Memory,” Introduction to Computer Science course, 2004, 20 pages, available at http://www2.cs.ucy.ac.cy/˜nicolast/courses/lectures/MainMemory.pdf. |
Sony Corporation, Digital Still Camera (MVC-CD200/CD300), Operation Manual, 2001, 108 pages, Sony, Japan. |
Steve'S Digicams, Kodak Professional DCS 620 Digital Camera, 1999, 11 pages, United States, available at: http://www.steves-digicams.com/dcs620.html. |
Gregory J. Allen, “The Feasibility of Implementing Video Teleconferencing Systems Aboard Afloat Naval Units” (Master's Thesis, Naval Postgraduate School, Monterey, California), Mar. 1990, 143 pages. |
Bell-Northern Research Ltd., “A Multi-Bid Rate Interframe Movement Compensated Multimode Coder for Video Conferencing” (Final Report prepared for DARPA), Apr. 1982, 92 pages, Ottawa, Ontario, Canada. |
Xiaoqing Zhu, Eric Setton, Bernd Girod, “Rate Allocation for Multi-Camera Surveillance Over an Ad Hoc Wireless Network,” 2004, 6 pages, available at http://msw3.stanford.edu/˜zhuxq/papers/pcs2004.pdf. |
U.S. Appl. No. 14/588,139, filed Dec. 31, 2014, 30 pages. |
Notice of Allowance issued in U.S. Appl. No. 14/588,139 on Aug. 14, 2015, 19 pages. |
Office Action issued in U.S. Appl. No. 14/715,742 on Aug. 21, 2015, 13 pages. |
Office Action issued in U.S. Appl. No. 14/593,853 on Sep. 11, 2015, 48 pages. |
“IEEE 802.1X,” Wikipedia, Aug. 23, 2013, 8 pages, available at: http://en.wikipedia.org/w/index.php?title=IEEE—802.1X&oldid=569887090. |
Office Action issued in U.S. Appl. No. 14/686,192 on Dec. 24, 2015, 12 pages. |
Office Action issued in U.S. Appl. No. 14/593,722 on Sep. 25, 2015, 39 pages. |
Number | Date | Country | |
---|---|---|---|
20160066085 A1 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
62044139 | Aug 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14588139 | Dec 2014 | US |
Child | 14593956 | US |