Release monitoring through check-in and tethering system
First Claim
Patent Images
1. A method for providing tethering-based monitoring, comprising:
- receiving an indication to initiate a check-in procedure on a tethered mobile device;
initiating, based on the indication, the check-in procedure on the tethered mobile device, wherein the check-in procedure comprises;
transmitting, to the tethered mobile device, at least one of a real-time verification request that is configured to be displayed on the tethered mobile device and a check-in request that is configured to be transmitted from the tethered mobile device to a tethered monitoring device;
receiving a response to the at least one of the real-time verification request and the check-in request; and
performing a validation of the response, wherein the validation includes determining whether the response includes a verification response to the real-time verification request or a check-in response to the check-in request; and
performing a follow-up action based on the validation of the response.
7 Assignments
0 Petitions
Accused Products
Abstract
A check-in and tethering system for monitoring persons such as released in court-ordered supervised programs and a method for operating such a system is disclosed. The system includes a tethered mobile device that provides a check-in procedure that requires a response from a user of the tethered mobile device in the form of at least one of a device identifier from a monitored tethered device attached to the user, a biometric response, or a performed action by the user. The tethered mobile device determines whether the response is valid and transmits a notification to a monitoring center in response to the determination.
96 Citations
20 Claims
-
1. A method for providing tethering-based monitoring, comprising:
-
receiving an indication to initiate a check-in procedure on a tethered mobile device; initiating, based on the indication, the check-in procedure on the tethered mobile device, wherein the check-in procedure comprises; transmitting, to the tethered mobile device, at least one of a real-time verification request that is configured to be displayed on the tethered mobile device and a check-in request that is configured to be transmitted from the tethered mobile device to a tethered monitoring device; receiving a response to the at least one of the real-time verification request and the check-in request; and performing a validation of the response, wherein the validation includes determining whether the response includes a verification response to the real-time verification request or a check-in response to the check-in request; and performing a follow-up action based on the validation of the response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A tethered mobile device, comprising:
-
a memory; and a processor coupled to the memory, the memory configured to store program code that when executed by the processor causes operations to be performed, the operations comprising; transmitting, to a monitoring center, a trip request, wherein the trip request includes a current location of the tethered mobile device and a destination; receiving, from the monitoring center, a trip itinerary in response to the trip request, wherein the trip itinerary includes a route from the current location to the destination; receiving, from the monitoring center, an indication to initiate a check-in procedure on the tethered mobile device in response to the tethered mobile device moving to an updated location along the route; initiating, based on the indication, the check-in procedure on the tethered mobile device, wherein the check-in procedure comprises; receiving, from the monitoring center, at least one of a real-time verification request that is configured to be displayed on the tethered mobile device and a check-in request that is configured to be transmitted from the tethered mobile device to a tethered monitoring device; and transmitting, to the monitoring center, a response to the at least one of the real-time verification request and the check-in request; performing a validation of the response, wherein the validation includes determining whether the response includes a verification response or a check-in response; and performing a follow-up action based on the validation of the response. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium having instructions stored therein, which when executed by a processor in a tethered mobile device, cause the processor to perform operations, the operations comprising:
-
receiving an indication to initiate a check-in procedure on the tethered mobile device; initiating, based on the indication, the check-in procedure on the tethered mobile device, wherein the check-in procedure comprises; transmitting, to the tethered mobile device, a real-time verification request that is configured to be displayed on the tethered mobile device; receiving a verification response to the real-time verification request; and performing a first validation of the verification response, wherein the first validation comprises determining whether the verification response includes an expected response to the real-time verification request; and in response to the first validation, transmitting, to the tethered mobile device, a check-in request that is configured to be transmitted from the tethered mobile device to a tethered monitoring device; receiving, from the tethered monitoring device, a check-in response, wherein the check-in response includes a device identifier of the tethered monitoring device; performing a second validation of the check-in response, wherein the second validation comprises determining whether the check-in response includes the device identifier; and performing a follow-up action based on the first and the second validation. - View Dependent Claims (17, 18, 19, 20)
-
Specification