白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Contraband detection through smart power components

專利號
US10096951B1
公開日期
2018-10-09
申請人
Global Tel*Link Corporation(US VA Reston)
發(fā)明人
Stephen L. Hodge
IPC分類
H01R13/66; H02J7/00; G01R21/133; H01R13/70
技術(shù)領(lǐng)域
contraband,smart,outlet,adapter,power,device,in,monitoring,module,center
地域: VA VA Reston

摘要

A method and system for contraband detection is provided that allows for the determining whether devices are authorized to receive power from an outlet. A power adapter and/or an outlet authenticate a device when it is connected to the outlet through the power adapter. On the basis of this authentication, a determination is made whether the devices are to receive power from the outlet. If the device is authorized, the outlet is activated, transitioning from inactive state (where no power is relayed through the outlet) to an active state (where power is relayed through the outlet).

說明書

BACKGROUND Field

This disclosure relates to detecting contraband devices through smart power components.

Background

In a controlled environment, such as a prison, there is a need for administrators to control and manage usage of devices within the environment. Residents of the controlled environment, such as inmates, use such devices to communicate with parties outside of the controlled environment, to connect with the Internet, or to consume content, to name a few examples of device usage. Controlled environments implement strict rules and policies governing how these devices are to be used and typically will approve any devices that may be used by, for example, providing residents with pre-approved devices that have been customized to comply with the strict rules and policies or installing management software on such devices that restrict or allow specific approved actions.

In order to avoid compliance, residents smuggle in contraband (e.g., unapproved) devices into the controlled environment which allow the residents to perform unapproved and unauthorized activities such as communicating with unauthorized outside parties, downloading unauthorized content, and/or browsing unauthorized web sites. Current methods for detecting these contraband devices are cumbersome and are not effective in preventing their usage while within the controlled environment.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

權(quán)利要求

1
What is claimed is:1. A method for contraband detection, comprising:detecting, by a smart outlet, a connection with a device and a power adapter;receiving, at the smart outlet, through the power adapter, identification information associated with the device;determining, by the smart outlet, whether the smart outlet contains a functioning contraband detection component;in response to determining the smart outlet contains the functioning contraband detection component, determining, by the contraband detection component based on the received identification information, whether the device is authorized to receive power from the smart outlet through the power adapter;in response to determining the smart outlet does not contain the functioning contraband detection component, transmitting, through a second connection between the smart outlet and a monitoring center, the received identification information and receiving a response from the monitoring center indicating whether the device is authorized to receive power from the smart outlet based on the received identification information;activating the smart outlet from an inactive state to an active state in response to the device being authorized;relaying, after the smart outlet is activated to the active state, the power from the smart outlet through the power adapter.2. The method of claim 1, wherein the smart outlet is prevented from relaying the power to the device while the smart outlet is in the inactive state.3. The method of claim 1, wherein determining whether the device is authorized to receive the power from the smart outlet comprises:retrieving a list of authorized identifiers associated with devices that are authorized to receive the power from the smart outlet;comparing the received identification information to the list of authorized identifiers; andidentifying the device as being authorized or not authorized based on the comparison.4. The method of claim 3, further comprising, in response to the device being identified as not authorized:transmitting an alert message to the monitoring center; andmaintaining the smart outlet in the inactive state.5. The method of claim 4, wherein the alert message is transmitted over the second connection between the smart outlet and the monitoring center, the second connection being a wireless connection or a powerline connection.6. The method of claim 1, wherein the power adapter is a smart power adapter and the received identification information is a contraband signal from the smart power adapter indicating results of a contraband analysis performed by the smart power adapter.7. The method of claim 1, further comprising:querying, through the connection, the device for the identification information associated with the device.8. A smart outlet for detecting contraband within a controlled environment, comprising:a memory; anda processor coupled to the memory, the processor configured to perform operations comprising:detecting a connection with a device and a power adapter;receiving, through the power adapter, identification information associated with the device;performing a contraband detection of the device, the contraband detection comprising:determining, whether the smart outlet contains a functioning contraband detection component;in response to determining the smart outlet contains the functioning contraband detection component, determining, by the contraband detection component based on the received identification information, whether the device is authorized to receive power from the smart outlet through the power adapter;in response to determining the smart outlet does not contain the functioning contraband detection component, transmitting, through a second connection between the smart outlet and a monitoring center, the received identification information and receiving a response from the monitoring center indicating whether the device is authorized to receive power from the smart outlet based on the received identification information;activating the smart outlet from an inactive state to an active state in response to the device being authorized; andrelaying, after the smart outlet is activated to the active state, the power from the smart outlet through the power adapter.9. The smart outlet of claim 8, wherein the smart outlet is prevented from relaying any power to the device while the smart outlet is in the inactive state.10. The smart outlet of claim 8, the authenticating further comprising:retrieving a list of authorized identifiers associated with devices that are authorized to receive the power from the smart outlet;comparing the received identification information to the list of authorized identifiers; andidentifying the device as being authorized or not authorized based on the comparison.11. The smart outlet of claim 10, the operations further comprising, in response to the device not being authorized:transmitting an alert message to the monitoring center; andmaintaining the smart outlet in the inactive state.12. The smart outlet of claim 11, wherein the alert message is transmitted over the second connection between the smart outlet and the monitoring center, the second connection being a wireless connection or a powerline connection.13. The smart outlet of claim 8, the operations further comprising:querying, through the connection, the device for the identification information associated with the device.14. A method for contraband detection, comprising:detecting, by a smart power adapter, a connection with a device;receiving, at the smart power adapter, identification information associated with the device;determining, by the smart power adapter, whether the smart power adapter contains a functioning contraband detection component;in response to determining the smart power adapter contains the functioning contraband detection component, determining, by the contraband detection component based on the received identification information, whether the device is authorized to receive power from an outlet through the smart power adapter;in response to determining the smart power adapter does not contain the functioning contraband detection component, transmitting, through a second connection between the smart power adapter and the outlet, the received identification information and receiving a response from the outlet indicating whether the device is authorized to receive power from the outlet through the smart power adapter based on the received identification information; andrelaying the power from the outlet through the smart power adapter in response to the device being authorized.15. The method of claim 14, wherein relaying the power from the outlet comprises activating the outlet from an inactive state, wherein the inactive state prevents the outlet from relaying power.16. The method of claim 14, wherein determining whether the device is authorized to receive the power from the outlet comprises:retrieving a list of authorized identifiers associated with devices that are authorized to receive power from the outlet;comparing the received identification information to the list of authorized identifiers; andidentifying the device as being authorized or not authorized based on the comparison.17. The method of claim 16, wherein further comprising, in response to the device being identified as not authorized, transmitting an alert message to a monitoring center.
微信群二維碼
意見反饋