Sie sind auf Seite 1von 12
(2) oy oy ~ 3) en @ 6s) or (2) 658) United States Patent Carbonell et al. MONITORING INDIVIDUALS USING DISTRIBUTED DATA SOURC ness Machines 1. Armonk, NY (US Lee A. Carbonell, Power Mound, TX (US); Tse S. Cheng, Grand Prarie, TX (US); deffrey L. Edgington, Keller, 1X (US); Pandian Mariadoss, Alien, 1X ws Assignee: International Business Machines Corporation, Arsonk, NY (US) Notice: Subject to any disclaimer, the team ofthis, patent is extended ot adjusted under 35 USC. 184(b) by $9 days Appl. Now 14/287,317 Filed: May 27,2014 Prior Publication Data US 201500347829.A1 Dee. 3, 2015, Int. Gok 900 (200601) CPC ac. GOK 9/0069 (2013.01); GO6K 9/0288 (2013.01); G06K 9/00771 (2013.01) of Classification Search 66K. 9100, 382/108 See aplication ile for complete search history. ~\n, 'US009355310B2 (10) Patent No. 4s) Date of Patent: US 9,355,310 B2 May 31, 2016 66) References Cited US. PATENT DOCUMENTS 8284255 B2_ 102012 Yokomitey SSohser B2* 102013 Yun coo1s 37865 200510288238 AL* 11/2008 Chapman ou. GOK 19 07381 235 380 2000022211 A1* 102006 Olivo cask 910009 BS 20190222509 AL 82013 Shaw aoin22io06 AL* 82013 Azar CG5k 900802 * cited by examiner Primary Examiner — Stephen R Koziol Assistant Examiner —Delomia L Gillian (74) Attorney, Agent or Firm — Isaac J. Goose on ABSTRACT One or more processors receive data from one or more eviees including an image ofan individual and information that indicates the identity ofthe individual. One or bothof the image and the information ielude data that indicates a loca ‘ion, One oF more processors analyze the image of an indi- vidual and the information to generate a set of identit¥ing characteristics for the individual, Based on result of the alysis, one or miore processors determine whether theset of | identifying characteristics of the individual matches a recorded set of identifying characteristics of that individual ‘Within a threshold. In response ta determination that there is match within the threshold, one or more processors assac- fate the location with the individ 20 Claims, 3 Drawing Sheets ae Deen Fo 1 aaa nga wD HOMEBASE ~~“ U.S. Patent May 31, 2016 Sheet 1 of 3 US 9,355,310 B2 100 COMPUTING DEVICE 120 SERVER COMPUTING DEVICE 110 TRACKING PROGRAM us USER PROFILES. 16 DATA SOURCES uz MONITORING DEVICES. 140 FIG. 1 U.S. Patent May 31, 2016 Sheet 2 of 3 US 9,355,310 B2 200 UN, START ) ACCESS PROFILE DATA IN USER PROFILES 116 205 MONITOR DATA IN DATA SOURCES 117 210 IDENTIFY LOCATION OF INDIVIDUAL 215 220 ) INCENTIVES TO NO BE APPLIED? 225“\_, UPDATE ACCOUNT OF INDIVIDUAL 230 NO SEND MESSAGE? YES 235’) GENERATE AND SEND MESSAGE END FIG. 2 U.S, Patent 320 DISPLAY May 31,2016 Sheet 3 of 3 US 9,355,310 B2 ‘MEMORY 314 PERSISTENT ‘STORAGE PROCESSOR(S) vo INTERFACES) COMMUNICATIONS UNIT EXTERNAL DEVICE(S) FIG. 3 US 9,355,310 B2 1 MONITORING INDIVIDUALS USING. DISTRIBUTED DATA SOURCES. BACKGROUND OF THE INVENTION ‘The present invention relates generally athe field of secu rity, and more particulady to verifying the location of an individual. ‘In some scenarios, with an increase in population density ‘and in publically available tansportation, such as buses, trains an tev servies, thre is.proportionate increase inthe umber of individvals that are mobile within a given metro- politan ara, Purher, as metropolitan areas gow there isn ‘ever increasing number of venves and locations of interest that become available to those individuals, sueh as, for ‘example, skateboard parks and shopping malls In other scenarios, there may be a small population thats spread out over a anger are, However, in tat scenario there may be a far greater number of locations of interest that bocome availabletothose individuals, Forexample, areas that ‘offer great vantage point for nature watching, SUMMARY, Embodiments of the present invention provide a metho, system, and program product for determininga location of an individ. One of more processors receive data from one oF more devices that are configored to gather atleast one image ‘ofan individal and at least one information that indicates the ‘identity ofthe individual, Oneorbothof thea leastoneimage ‘and the atleast one information include data tht indicates 9 Tocation. One or more processors analyze the a least one mage of an individual and the atleast one information 10 generate a first set of identifying characteristics of the indi Vidal, One oF more processors determine whether the fist set of dentlying characteristics ofthe individual matches s6o- ‘ond set of identifying characteristes ofthat individual, within ‘a threshold. The second set of identifying characteristics of that individual are of reco. In response toa determination that the fst set of identifying eharacterstis matches the second set of identifying characteristics within the threshold, ‘one oF more processors associate the loeation withthe indi Vidal BRIEF DESCRIPTION OF THE DRAWINGS. FIG. 1s a functional block diagram illustrating & metro politan information technology (IT) environment, in accor ‘dance with an embodiment ofthe present invention. FIG, 2 illustrates flowchart of operational processes ofa tracking program, executing on a computing device within the environment of FIG. 1, in accordance with an embod ‘mnt ofthe present invention FIG, 3 depits a block diagram of components of @ com= puting device, a monitoring device, and the server computing ‘device executing the tracking program, in accordance with ‘embodiment ofthe present invention, DETAILED DESCRIPTION ‘The safety and whereabouts of certain individuals soften top concern among many authority figures There sre many situations where an individual is ouside of home without being with an authority figure. For example, walking or tak- ‘nga bus tofrom school or library, poing to shopping malls or ‘movie theatres with frends, ct. In certain known solitons, in onder to monitor the whereabouts of an individual, the 0 o 2 authority figure provides a GPS-enabled mobile phone tothe individual to carry and subscribes to monitoring service pro- vided by a wireless carer. lowever, do to financial or ther reasons, this option may not be viable to many authority figures, AS such, in other known solutions, there are programs (hich are sometimes fre to authority figures andior mandated by schools) for ‘cocking certain individuals, For example, some schools trick their stadents with radio frequency identification (RFID) tags ‘while the students are on campus. Such & program could certainly noify authority figures when an individusl, under their care, enters or leaves school. However, once such an indvidval s outside ofthe schoo, the school and the author ity figures lose the ability to monitor the individual sine the [RFID tags eannot be detecied by the sensors located at the school, which have Fimited sensing range. In ation, with such programs, there are often privaey concerns for he ind vidual since in some cases the authority figures and the indi- vidual may not have the choice to opt-out such programs. ‘While known solution to tack the location of an individual fare known they have inherent limitations de to thie imple- ‘mentation. Some require an individual to cary a traceable device, such as an RFID tag or global positioning system (GPS) device. Others are only capable of tacking or tracing. the location ofan individual within avery imited area, such asa building ots surrounding property ‘Anembodimeat of the present invention recognizes that it is dificlt wo wack the whereabouts an individual if that nd vidal i in an environment that is ot specifically configured forsuch racking, suchas ashopping mall, Anembodiment of the present invention recognizes that it is often dificult to Inne individuals cary a traceable device. An embodiment of the present invention recognizes that privacy cancers for an individual may discourage the use of tracking systems by some authority figures. An embodiment ofthe present inven- ‘ion provides multiple sources of information that are used 10 {termine the location ofa given individual. An embodiment of the present invention provides authority figures with the ‘option of selecting which types of datasources are used for ‘eacking purposes. An embodiment ofthe present invention provides tacking of individuals without the required use of traceable device that must be carried by the individual. An embodiment of the present invention provides verifiable ‘wocking of specific individuals, Aa embodiment of the resent invention provides incentives to encourage individu- Also provide data that is use 0 verify ther locaton, “The present insention will ow he desribed in detail with reference tothe Figures, FIG. 1 isa funetional Block diagram illustrating a metro polit information fetinology (IT) envionment, generally esignated 100, in aecordance with an embodiment of the present invention. Metropolitan IT environment 100 includes Server computing device 110, computing device 120 and ‘monitoring devices 140 connected over network 130. Server computing device 110 includes racking program 118, user profiles 116 and data sources 117. In general, in the illustra tive embodiments described herein, metropolitan IT environ- ‘meat 100 represents city with large human population and has the IT infrastructure, software, computers and tele- communications equipment, to store, retrieve, transmit and ‘manipulate data as required by racking program 118. Inthe illustative embodiments described herein, such daa is gath- ‘ered by monitoring devices 140 and is stored as part of data sources 117, Tn various embodiments, server computing device 110 83 computing device that can be standalone device, a server a Jpop computer, a tablet computer, a netbook computer, & US 9,355,310 B2 3 personal computer (PC), ora desktop computer. In another ‘cmbodiment, server computing device 110 represents a com puting system uilizing clustered computes and components toactasasingle pool of seamless esourees. In general server ‘computing device 110 can be any computing device or 3 ‘combination of devices with access to tracking program 115, user profiles 116 and data sources 117 and is capable of ‘executing tricking prognim 115, Server computing device 1110 may’ include internal and extemal hardware components, asdepicted and described in unr detail withrespectto FIG. 3 In various embodiments, computing device 120 is a com- puting device that ean bea smartphone, a faptop computer, a Tablet computer, a netbook computer, personal computer (PO),or desktop computer that is connected to network 130. In another embodiment, computing deviee 120 represents 3 ‘computing system utilizing clustered computers and compo= rents to act asa single pool of seamless resources. In certain ‘embodiments, computing device 120 is configured to update user profiles 116 in response to input fom s user, Computing ‘deviee 120 may include internal and extemal hardware com= ponents. as depicted and described in further detail with Fespect to FIG. 3, in accordance with various embodiments, Tn various embodiments, monitoring devices 140 are devices, oF combinations of devices, that are configured t0 tather data and to store tt data as part of data sources 117. In some embodiments, monitoring devices 140 include, for ‘example, video recording devices, audio receiving devices, keypads forkey-code entry har eode scanners, magnstic strip scanners, RFID tag seanners and biometric scanners, such as finger print and retinal patter scanners. In general, monitor ing devices 140 include any devie or combination of devices that are connected to network 130, which are capable of pathering information required by tricking program 115 and are able to include that data as part of data sources 117, as ‘explained in further detail below. Its to be noted that in certain embodiments, monitoring devices 140 may include ‘intemal and extemal haedware components, as depicted and ‘described in farther detail with respect to FIG. 3 Inanembodiment, tracking program 118, user profiles 116 sand data sources 117 are stored on server computing device 10. However, in other embodiments, tacking peogram 115, user profiles 116 and data sources 117 may be stored exter nally o server computing device 110 and accessed through 3 ‘communication network, such as network 130, Network 130, ‘can be, for example, «local area network (LAN), a wide ares network (WAN) such as the Interet or a combination ofthe ‘and may inchde wited, wireless, ber optic or any ether ‘connection known inthe at. In eneral, network 130 can be ny combination of connections and protocols that will sup- Port communications between server computing device 110 ‘computing device 120, tracking program 115, user profiles 116and.data sources 117, inaceontance withan embosimeat. TIn-an embodiment, tracking program 118 determines the location ofan individual by monitoring spect types of data streaming from a variety of data sources, such as those included in datasources 117. In various embodiments, trck- Jing program 115 identifies individuals, atleast in part, by applying facial recognition techniques to video data received from data sources 117, e.,by analyzing facial features using ‘cial recognition software. Insome cases, the location ofthe device that captured the video data is known to tracking program 118, As ich, identification ofthe individual in that ideo data allows tracking program 115 to determine the location of the individual. In other eases, tricking program IS analyzes objects, sounds and characters incl in the video data to locate the individual. For example, analysis of o 4 the video data indicates the sou ofa train passing by along with letering that reads “XYZ”. In this example, the user profle includes the names and addresses of the friends of the individual along with a known range of savel of the indi- vidual. Tracking program 118 searches the intemet for tain trocks, the words" XYZ" and the known range of travel ofthe individual. Tracking program 118 applies statistical analysis to the results of the search and determines tht the individval is most ikely atthe house of their fiend BB. In some embodiments, tracking program 118 also deter- nines the location ofan individual based on a code entey ata keypad. In such scenarios, the location the keypad isknowa to or is determinable by tracking program 118. As such, the locaton ofthe individual is implied via the entry ofthe code ‘sing the keypod and rocking program 115 logs the location ‘ofthe indvidhal to eoineide with that of the Keypad, In some embodiments, tracking. program 11S also determines the location ofan individual based on aa RFID reader tht scans a eard of RFID-enabled key chain. In some embodiments, ‘eucking program 115 also determines the location ofan indi vidual based on the determined presence of a particular cell phone or another like portable computing device such as a laptop. In some embodiments, tracking program 115 also ‘determines the location ofan individual based on a barcode scanner that scans a keychain, In some embodiments, track- ing program 115 also determines the location ofan individual ‘based ona type of biometric identification, suchas a finger print taken using fingerprint reader. In short, tracking pro- ‘gram 115 identifies individuals based on facial recognition techniques and can, depending on the embodiment and type of information available, further verify that identification ‘using any of number of other techniques, such as those scribed above. In an embodiment, tracking program 118 provides a vari- cy of incentives to encourage individuals o provide data that is used, by tracking program 115, © determine their location For example, an individual scanning a harcodd keychain, using a bareode scanner ina sehoo! lunchroom, adds desert ‘money to a lunch scoount of that individual In another ‘example, providing a thumbprint and retinal sean ata scan- fing device in a shopping mall adds money t the account of the individual. In another example, a user verifying their identity by entering akey-code at movie ticket kiosk allows them to watch a movie ata movie theatre by printing tickets for the movie. The type of incentive offered by tracking rogram 11 for daa that verifies the foetion of an individual an vary from one embodiment to another nan embodiment, racking program 118 regularly updates the recon inchided in usee profiles 16 withthe determined locations of various individuals and the data related to the terminations of those locations. In certain embostiments, such updates are made based ona scheduled. Inother embed sens, such updates are made ia response 10 a determined Joestion ofan individnal. For example, an individual s deter ‘mined to be ata shopping mall when they re scheduled to be in school Inanembodiment, user profiles 116 includes profile infor- ‘mation for users that are registered with tacking program 11S. User profiles 116 also includes a set of reference char- acteristics and records forthe individual being tricked by ‘rocking program 118. In some embodiments, such chirae- teristics include biometric data such as fingerprint, retinal pattems, facial features, and a stature and build ofthe ind Yidual. In some embodiments, such records inchide known social and behavioral pattems of the individual such as asso- ciates that are often viited by the individ, common routes used by the individual, and range of travel typically ssoci- US 9,355,310 B2 5 ‘ated withthe individual. In some embodiments, user profiles IG includes socouat information for the individus) being tracked by tracking program 115 and forthe authority figure that initiated the tracking. his information i wsed by track- ing program 115 to provide incentives to the individual to provide information: described in further detail inthe disews- sion of FIG. 2, Foreach user profile, user profiles 16 includes records that shows the determined locations ofthe individual being tracked by tracking program 118, as dietated by the respective user profile, Such locations are generated when teocking program 115 identifies an individual and correlates that identification witha specific location. In some embodi- ‘ments, such records include audio data, video data or anthet orm of multimedia data that wos used vo determine the loea- tion of the individual being tracked! by racking program 115 For each user profile, user profiles 116 includes profile data that s relevant t an individual that is to be monitored hy ‘rocking program 115, For example, sch data can include the name, age and gender ofthe individual to be monitored as well as notification preferences, contact infomation for the thority figure of the individual, and a list of emergency ‘contacts for the individ Userprofles 11 6alsa includes a numberof preset les that ‘can be applied when tricking individuals. For example, the preset rles dictate the checkpoints to be used for idenifea- tion of the individual and the expected schedule for that individ. In another example, the preset rues dictate met- ‘(sof identification (eg. Unique code, RFID, cell phone, Bluctooth, et.) that are tbe employed when identifying the Individual. In some embodiments, certain preset rules are ‘configured to be customizable by users that are registered with trucking program 118. In certuin embodiments, such ‘costomized roles are saved as part of the user profile that is associated with a respective user that ereated the customized rules. For example, a configurable rule includes exceptions Jor various riteia and preset rules that are to beapplied when the individal is on vacation ar at home sick. “The profile data included in user profiles 116 also incies number af configurable settings that collectively indicate to tacking program 11S which tacking rlesare to beapplied to determine @ location of an individual and what sources of information are to be used for that detemmination. For ‘example, rule specifies that every three hours tacking pro- tram 118i to determine the location individual A based on Tacial recognition and voice recognition methods that are to be applied to video and audio surveillance data from a shop- ping mall, which is included as part of data sources 117. Tan embodiment, data sourees 117 isa large body of dat, jc, sources of information, that is accessed hy tacking pro- gram 115to determine thelocation of individuals as indicated by the settings included of a user profile included in user profiles 116. For example, data sourees 117 includes audio ‘and video data from school bus surveilaace equipment. [a nother example, data sources 117 ineludes scanned barcode data froma keychain eaderlocatedat the entrancetoanoutlet store at a shopping mall FIG. 2illustrates a Mlawchart, 200, operational processes ‘fa tacking program 115, executing on'a computing device Within the environment of FIG. 1, in accordance with aa ‘embodiment of te present invention. In process 208, tacking program 118 accesses the profile data, inclided in user profiles 116, Tracking program 115. ‘denies which individnals are to be monitored and what sources of data included in data sources 117, are to be used or that monitoring: based on the information included in the respective user profiles. In the following example, an author ity figure of an individual wishes to confirm that the indi- 0 o 6 vidual safely arrived and left the premises of school and did tot leave the school premises ring school hours. As such when tracking program 115 accesses the profile data, included in user profiles 116, tracking program 115 identifies profile data indicating te identity ofthe individual, hereafter referred to a8 “individual A”, as well as the preset and cus- ‘omized rates to be applied when identifying individual A. In this ease, customized rules specify specific time periods in ‘whieh individual A js fo be monitored, namely the time per- fod in which individual Ais traveling to and from schoo, ad the time period in which individual A is supposed to be ia school. It some embodiments, tracking prograg 115 moni- tors a group of individnals, For example, tricking program 118s scheduled © monitora group of individuals boarding a school bus. process 210, tracking program 115 begins monitoring the data included in data sourees 117 for information that (cocking program 11Sisto use to ident individuals, accord sng to the preset and customized rules in user profiles 16 that fare being applied. Continuing with the previous example regarding individyal A, when the bus returns 10 the bus garage, tracking program 118 receives a transmission from a video camera on the bs. The video camer in this example is configured to upload captured video footage whenever the bus returns tothe bus garage. As such, at least two sezments of video footage are uploaded fo data sources 117 during typical operation ofthe school bus. The first segment shows ‘which individuals boarded the bus to travel to the school The second segment shows which individuals boarded the bus to Teave the school “The school also has a motion activated video recording system installed in the hallways, which uploads eaptured video to data sources 117 whenever viden is recorded. In Addition, idividval A eases an idemtiieation card with him! bet. This curd is used by individual ata kiosk inthe scfool Juneh room, The kiosk includes a keypad, a microphone, thermal video camera anda fingerprint seanner, which indi- vidal has to aetivate in order to have finds transfered 10 their school hinch account. As such, to purchase lunch and 2 desert individual A aetivates the kiosk by sling te ident fication card through a slot configared to ead the car. The kiosk reads the identification eatd and prompts individual A to place ther thumb on the finger print reader. to enter & password via the keypad, speak a password into the miero- Phone and to ook into an opening to provide a retinal sean ‘Meanwhile, the kiosk has taken multiple thermal images of the face of individual A. In process 215, tracking program 118 identifies the oea> ‘ion ofthe inividualhased onthe information retieve rom data sources 117. In coatiouation with the previous example ‘ezanding individual A, throughout the seiool dey, tracking program 115 receives the following: the first and second Segments of video Footage from the bus when the bus fetus to the bus garage, fourteen videoclips taken by the motion activated video recording system, information indicating the ‘activation ofthe kiosk using the identification card along with the thumb print, entered password, spoken password, retinal scan and thermal images. As this information is identified by ‘rocking system 116, tracking system 11S applies numberof recognition techniques to verify the identity of individual A. ‘These techniques include facial recognition techniques that fare applied to the frst and second segments of video footage trom the bos, the fourteen vidooelips and The thermal images captured bythe kiosk, ‘Asarestt of the application of the aforementioned recog nition techniques, racking program 115 matches the various tances of the face of individual A, which was ietiied US 9,355,310 B2 1 from the bus video footage, fourteen video clips, and the thermal images, o stored images of individual A that are included as pari of user profiles 116, In addition, tacking program 115 ses voice recognition techniques to analyze the Spoken password, and matches the voice patter 0 a patiera ‘ofindividual A, which s included as par of user profiles 116, Tracking program 115 also matches the entered password, thumbprint and retinal scan to a password, thumbprint and retinal sean of individual A, as which ae inchude! as part of user profiles 116, Based on the results of the fcial reve tion and other recognition techniques as described above, trucking program 113 ideaiies individual A at each of the respective locations which are incated by tho various data retrieved fom datasources 117. Inthis embodiment, tacking program 115 determines whether a match exists hased on Whether there is a match within a specified threshold, For ‘example, a match in voice pattern that is within 95% of a perfect match As suchas the day progresses and the various ‘tai retrieve from datasources 117, tacking program 115 ‘reales 8 numberof enries that correspond to ec location, ‘which indicate that individual A was identified a that loca tion, and saves those entries as part of ser profiles 116. In some embodiments, time stamp is inckaded in sch entries to indicate the time at which individual A was identified at a particular location ‘In decision process 220, tracking program 118 determines ‘whether incentives are to be applied in response to the iden- lication ofan individual aa particular locaton, In general, inthis embodiment, the application of incentives in response to the idemifiation ofan individual ata particular location jnvolves the trinsfer or release of funds for use by the indi- vidual. As such, multiple forms of identification ae required jn onder to initiate such an application. In continuation with the previous example regarding individual A, the preset and ‘costomizedrules indicate that a positive identification af indi Vidal in the lunchroom, vi the kiosk, i to result in a once ‘day transfer of funds from an account of the authority figure to the school inch account of individual A. As such, as @ result of the positive identification of individual A via the Kiosk using multiple forms of verification; tracking program 11S.determines that incentives areto be applied in response to the identification of individual A a the Tuned room. In this ‘embodiment, if tacking program 118 determines that incen- tives are to be applied in response othe identification of an ‘individual ata particular location, then racking program 13 proceeds 10 update the nocount of the incl, in process 225. In this embodiment, tracking program 115 updates the ‘account of the individual by transferring Tunch money, oF ‘another form of compensation, from the account of the authority figure to the account of the individual. In othee ‘embodiments, the method used by tracking program 118 t0 provide incentives varies, and would be understood by one ‘illo in heart In this embodiment, i tracking program 13 ‘determines that incentives are not o be applied in responseto the identification ofan individual ata particular location then tracking program 115 proceeds to deision process 20. Indecision process 230, tracking program 118 determines ‘whether fo send a message based on the preset and custom- ied rules. In some cases, a regular update is desired by the authority figure regarding the location ofan individual. As sue, based on the preset and customized rules tracking pro- ‘gram 118 determines whetherto senda message based on for ‘example, the time of day. In some embodiments, tacking program 115 determines whether to senda message based on the identification ofan individ at a particular location, and jin response to the preset and customized rules. In some ‘embosdiments, such rules indicate that a message sto be seat 0 o 8 in response to the identification ofthe individual entering oF Jeaving a particule location, For example, an individual is identified at an exit and then shorly afer, the individual is ‘dentifed athe perimeter ofa particular property. Asa resul trucking program 118 determines lo send a message to aa authority figure indicating thatthe individval has lef the property, according to the preset snd customized rules. As such, in certain embodiments racking program 118 is con- figured to extrapolate a probable locaton ofan individ or, asin the previous example, where the individual is ikely not located, I?'tracking program 11$ determines not to send a message based on the preset snd customized ules, then tracking pro- gram 118 reumns to process 210, If tucking program 115 ‘termines to send a message in response to send a message ‘based on the preset and customized rules, then tracking pro- ram 118 generates and sends such message based on the preset and customize rales, n process 238, In some embodi- ‘mens, the preset and customized rules indicate te schedule of the individual and if wseking program 118 is unable 10 ‘identify that individual, then tracking program 115 deter ‘mines that a message is to be sent. Por example, if an indi- Vidal is scheduled to arrive home by no later than eleven ‘pi hen tracking program 115 will sed a message, accord ing fo the customized rules, to a phone number and email address ofthe authority figure if tacking program 118 does ‘not identify the location ofthat individual as home by eleven ‘pi. Inother embodiments, racking program 11S is conig- ‘recto predict an expected arrival or departure time based on factors sichas modes transportation (e-z, walking, biking. ‘or public transportation), inclement weather, and traiie pate tems. In sich embodiments, tricking program 115 uses this information to predict how quiekly an individual willbe able to trivel from one location lo another and calculates an est ‘mated arrival time based on that rate of travel, In another ‘embodiment, racking program 115 use historical data, such asprevious times and dates when an individual was identified fata location, to predict future instances of that individval being at that same location In such embodiments, the histori cal data sinclded in anc or both of user profiles 16 oF data sources 117, Inthivembodiment, as partofthe determination of whether ‘o send a message based on the preset and customized rules, ‘evoking program 118 determines whether dhe presel und eu ‘omized rues indicate that monitoring ofthe individual isto cease, For example ifa scheduled time period for monitoring ‘the individual has passod, n continuation with the previous ‘example regarding individual A, the preset and customized ries indicate that monitoring ofthe location of individual A is to cease once tricking program 115 has identified indi- vidual A as having exited the schoo! bus, via analysis ofthe second segments of video Jooue fom te bus. As Such, once. tracking program 118 has identified individual A as having «exited the sehioo! bus, tracking program 115 logs the location of individual Aas being “home” and ceases monitoring sctiv- ity foe that day. In some eases, tracking program 118 sends 9 report othe suthorty figure once monitoring has ceased. In some embodiments, such a report indicates the locations at ‘whieh the individual was identified during the period of moni- toring FIG. 3 depicts a block diagram, 300, of respective compo- nents of server computing device 110, computing device 120 and monitoring devices 140, in accordance with an embod ‘meat of the present invention. It should be appreciated that IG. 3 provides only an illsiation of one implementation and does not imply any imitations with regard to the envi- US 9,355,310 B2 9 ronments in which different embodimeats may be imple- mented. Many modifications to the depicted envizonzient may be made ‘Server computing device 110 and computing device 120 respectively include communications fabric 302, which pro- vides communications between computer processor(s) 304, memory 306, persistent storage 308, communications unit ‘310, and input’output (VO) interfee(s) 312. Communica tions fabric 302 can be implemented with any architecture ‘desjuned for passing data andr control information between processors (such as microprocessors, communications and network processors, ele.), system memory, peripheral devices, and any other hardware components withina system, For example, communications fabric 302 can be imple- rented with one or mre buses. ‘Memory 306 and persistent storage 308 are computer readable storage medi. In this embodiment, memory 306 Includes random access memory (RAM) 314 and cache memory 316, In general, memory 306 can include any suit- able volatile of nonvolatile computer-readable storage resi, “Tracking program 11S, user profiles 116 and data sources 117 are tore in persistent storage 308 for exeeution andor access by one or more of the respective computer processors 4304 vin one or more memories of memory 306, In this ‘emboviiment, persistent storage 308 includes a magnetic hard disk deve, Altematively, or in addition (0 @ magnetie hard disk drive, persistent storage 308 canincludea slid state hard drive, a semiconductor storage deviee, read-only memory (RON), “crasable programmable read-only _ memory (EPROM), flash memory, of any other computer-eadable storage media that is capable of storing program instrctions ‘or digital information, The media used by persistent stonge 308 may also be emovuible. For example, a emovablebrd deivemay be used orpersistent storage 308, Other examplesinckadeopticel and magnetic disks, thumb drives, and smart cards that are inserted into a drive for transfer onto another computer-tead- ablestorage medium that salso par of persistent storage 308, ‘Communications unit 310, i these examples, provides for ‘communications with other data processing systems oF devices, including resources of network 130. In these ‘examples, communications unit 310 includes one or more network interface curds, Communications ait 310 may pro- vide communications through the use of either or both physi- ‘eal and wireless communications Tinks. Tricking program 115, user profiles 116 and data sourees 117 may’ be down= Jaded to persistent storage 308 through communications unit 310. ‘WO interface(s)312 allows forinpotandoutputof data with ‘other devices that may be respectively connected to server ‘computing device 110 and computing device 120. For ‘example, /0 interface'312 may providea connection toexter- nal devices 318 such as a keyboard, Keypad, a touch sereen. andlor some other suitable input device. ternal devices 318 ‘can also include portable computer-readable store media such as, for example, thumb drives, potable optical or mag netic disks, and memory cards, Software ac data used to practice embodiments of the present invention, eg. tacking program 118, user profiles 116 and data sourees 117, can be Storedon such portable computer-eadable storage media and ‘canbe loaded onto persistent storage 308 via LO interface(s) 5312. 0 interlaco(6) 312 also connect to a display’ 320. Display’ 320 provides a mechanism to display data toa user and may be, for example, computer monitor, ofa television 0 o 10 The present invention may bea system, a method, and/or ‘computer program product. The computer program product ‘may inclode computer readable storage medi (or mela) having computer readable program insiactions thereon for causing a processor to cary out aspects ofthe present inven The computer readable storage medium can be a tangible device that can retain and store instructions for use by a instruction execution device. The computer readable storage medium may be, for example, but is aot limited to, an elec- twonie storage device, a magnetie storage device, an optical storage device, anelectromapnetistorage device, asemicon- ductor storage device, of any suitable combination of the Toregoing, Anon-exbausive lis of more specific examples of the Computer readable storage medium includes the follow ng: a portable computer diskette, a ard disk, rando access memory (RAM), 8ead-only memory (ROM), an exas- able programmable read-only memory (EPROM or Flash memory), static random access memory (SRAM), & por table compact dise read-only memory (CD-ROM) digital versatile disk (DVD), a memory stick, « floppy disk, 2 ‘mechanically encoded device such as punch-cards or mised structures in a groove having instructions recorded thereon, ‘and any suitable combination ofthe foregoing. A computer readable storage medium, as used herein, isnot to be cone strued as being transitory signals per se, such as radio waves ‘or other freely’ propagating electromagnetic waves, electeo- magnetic waves propagating trough a waveguide or other transmission modia (eg. ight pulses passing through afber- ‘optic cable), or electrical signals transmitted through a wire ‘Computer readable program instructions described herein canbe downloaded to respective compurting/processing Sovices from a computer readable storage mesa ort an extemal computer oF extemal storage device vin network, for example, the Intemet, a local area network, a wide area network and/or a wireless network, The network may com- prise copper transmission cables, optical transmission fibers, ‘wireless transmission, routers, firewalls, sites, gateway computers andiar edge servers. A network adapter card oF network interface in each computing/processing. device receives compiler readable program instictions from the network and forwards the computer readable program jnstrctions for stonge in a computer readable’ stomige ‘medium within the respective computing/processing deviee. ‘Computer readable program insiructions for earying out ‘operations ofthe present invention may be assembler insrne- tions, —instrction-set-architecture (ISA) — instructions, ‘machine insirutions, machine dependent instructions, erocode, emoareinstrictions, sate-setting daa, or either source code or object cade writen in any combination of one fF more programming languages, including an object or ented programming language such as Smalltalk, C+ or the like, and conventional procedural programming languages, suchas the "C” programming langwge or similar program ‘ming languages. The computer readable program insieetions ‘ay execute entirely on the user's computer, partly on the user's computer, asa stand-alone software package, partly on the user’s computer and partly on a remote computer or entirely onthe remote computer or server. Inthe latter sce- nario, the remote computer may be connected to the wser's ‘computer through any type of network, including a loeal area network (LAN) ora wide area network (WAN), or the con- ‘ection may be made to an external computer (Kor example, through the Intemet sing an Internet Service Provider) in some embodiments, electronic cireitry including, Tor ‘example, programmable Inge circuitry, Held-programmable sate arrays (FPGA), or programmable logie arrays (PLA) US 9,355,310 B2 uw ‘may execute the computer readable program instructions by tllzing state information ofthe computer readable program instructions to personalize the electronic citcuitry, in onder t© perform aspects ofthe present invention, “Aspects ofthe present invention ae described herein with reference to flowchart illustrations and/or block diagrams of| methods, apparatus (systems), and compater program prod- tits seconting to embodiments of the invention. It will be understood that each block of the flosschar illustrations and! ‘or block diagrams, and combinations of blocks in the fow= ‘chart illustrations andlor block diagrams, ean be imple ‘mented by computer readable program instructions. “These computer readable program insirutions may bepro= vided (01 processor ofa general purpose compute, special Purpose computer, or other programmable data processing apparatus to prodice a machine, sue thatthe instruction, ‘which execute via the processor of the computer or other programmable data processing apparatus, create means for Implementing the functions/acts specified in the flowchart ‘and/or block diagram block or Blocks. These computer read able program insirctions may also be stored ina computer readable storage medium that can directa computer, a pro- _grammable dats processing apparatus, and/orother devicesto Tnetion i. a particular manner such thatthe computer read- able storage medium having insisctions tore therein com prises an article of manufacture including instructions whic Implement aspects of the function/act specified inthe flow= ‘har andor block diagram block or blocks “The computer readable program instructions may also be Joaded onto computer, other programmable data processing ppartus, or other device to cause a series of operational steps fo be performed on the computer her programmable appar or other device to produces computer implemented process, such that the instructions which execute on the eo Puler, other programmable apparatus, or other device imple- ment the lunetions/acts specified in the flowehart andor black diagram block or blocks, “The lowehart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer pro- ‘anim pmidicts acconding to various embodiments of the present invention. In his regard, each block in the fowehart ‘or block diagrams may representa module, segment, of por: tion of instructions whieh comprises one or more executable instructions for implementing the specified logical function (3). In some alternative implementations, the funetions noted Jn the block may occur out of the order noted in the figures For example, two blocks shown in succession may, in fet, be ‘executed substantially concurrently, or the Blocks may some times be executed in the reverse order, depending upon the Sunetionality involved. It will also be noted that each block of the block diagrams andlor flowchart ilusteation, and combi- nations of blocks in the block diagrams and/or fowchart ithastation, can be implemented by special purpose hard- ware-based systems that perform the specified functions or cts or cary out combinations of special purpose hardware ‘and computer instructions. The programs described herein ave identified based upon the application for which they see implemented in a specie ‘emboviiment othe invention. However, it should be apprect- ‘ated that any panicular program nomenclature herein i used merely for convenience, and thos th invention should not be limited 10 use solely in any specific aplication identified andor implied by such nomenclature. I's to be noted thatthe termi) “Smalltalk” and the Tike ray be subject to trademark rights in various juris throughout the world and are used here onlin releren 12 the products or services properly denominated by the marks to the extent that suc trademark rights may exist ‘What is claimed is 1. Amthod for determining location ofan individual, the 5 method comprising: receiving, by one or more processors, data from one or more devies that are configured to gather at least one image ofan individual and at least one information tat indicates the identity’ ofthe individual, wherein one or both ofthe at least one image andthe atleast one infor- ‘mation include environmental data captured by the one ‘or more devices that indicates distinguishing charac- teristic ofthe environment of the individual; analyzing. by one or more processors, the at Ieast one image ofan individual and heat leastone information to i) yeneratea frst set of identifying characteristics ofthe individual, i) determine a possible location associated ‘withthe environmental dats; detemning, by one ormore processor, whether the ist set of identifying characteristics of the individual matches @ second set of identifying characteristics of ‘that individual within a frst thresbold, wherein the see- ‘ond set of identifying characteristics ofthat inividal are of record, and i) a likelibood thatthe individual ‘would be atthe possible location; responsive toi) determination that the first set of de ing characteristics matches the second set of identifying characteristics within the frst threshold and i) dhe fike- Tihood thatthe indivicual would be a the possible loca tion i above a socond threshold providing, by the one or more processors, an incentive to ‘the individual to provide an additional data based, at least in parton the possible location; and. responsive to reception of the additional data, determin ing, by one or more processors, that the possible location ‘ofthe individval indicates an aetual location of the ind- vidual. 2. The method of claim A, wheroin the step of weeviving. by ‘one ar more processors, data from one or more devices that are configured to gathe atleast one image ofan individval And at last one information tht indicates the identity ofthe ‘ndividoa Furthee comprises: receiving, by one ormoreprocessors, data fromat leastone device configured to capture facial features ofthe inl Vidal: and receiving by one or moreprocessors, data fromat leastone device configured to capture biometric data to indicate the identity of that individual 3. The method of claim 1, wherein the at least one infor: mation includes one or hath ofa) fist sequence of charac- ters thatare entered bythe individual into adevice included in the one or more devices, and b) a second sequence of char acters that are provided by an object ia possession of the individual when the individval uses the deviesinclded inthe fone oF more devices “4. The method of elaim 1, wherein the second set of iden- tifying characteristies of the individual arcinelided a part oF a profile of an authority figure, wherein the profile of the authority fluure indieates that the location of the individual is to be determined! based, atleast in part, on data from one or more devices, and wherein the profile includes a set of eon- figurable rules tht are to be applied when determining the location ofthe individual. '. The method of claim 1, whercin, analyzing, by one or more processors, the at Teast one image of the individ and thet lest one information to generate the fist set of ident ‘ving characteristics of the individual further comprises 0 o US 9,355,310 B2 13 using, by one or more processors, one that are configured for facial recogni atleast one image; and using, by one oF more processors, one oF more programs that are configured to analyze biometric data of the indie Vial that i captured by the ane ar mare devices 6. The method of claim 4, the method further comprising generating, by one or more processors, a report that indi ates one oF more locations of the individual daring 8 period of time; and responsive (oa roquest forthe eport, sending, by one oF ‘more processors, the report Wo tae authority igure, 7. The method of eiain I, the method further comprising:

Das könnte Ihnen auch gefallen