US20080201158A1 - System and method for visitation management in a controlled-access environment - Google Patents

System and method for visitation management in a controlled-access environment Download PDF

Info

Publication number
US20080201158A1
US20080201158A1 US11/819,834 US81983407A US2008201158A1 US 20080201158 A1 US20080201158 A1 US 20080201158A1 US 81983407 A US81983407 A US 81983407A US 2008201158 A1 US2008201158 A1 US 2008201158A1
Authority
US
United States
Prior art keywords
visitation
party
session
visitation session
controlled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/819,834
Inventor
Mark D. Johnson
James P. Rokosky
Joshua Dom
John P. Dale
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DSI-ITI LLC
Inmate Telephone Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/819,834 priority Critical patent/US20080201158A1/en
Application filed by Individual filed Critical Individual
Assigned to INMATE TELEPHONE, INC. reassignment INMATE TELEPHONE, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DALE, JOHN P., DOM, JOSHUA, JOHNSON, MARK D., ROKOSKY, JAMES P.
Publication of US20080201158A1 publication Critical patent/US20080201158A1/en
Assigned to DSI-ITI, LLC reassignment DSI-ITI, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ITI INMATE TELEPHONE, INC.
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS reassignment CREDIT SUISSE AG, CAYMAN ISLANDS SECURITY AGREEMENT Assignors: DSI-ITI, LLC
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH FIRST LIEN PATENT SECURITY AGREEMENT Assignors: DSI-ITI, LLC, GLOBAL TEL*LINK CORPORATION
Assigned to DSI-ITI, LLC reassignment DSI-ITI, LLC RELEASE OF SECURITY INTEREST IN PATENTS Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH SECOND LIEN PATENT SECURITY AGREEMENT Assignors: DSI-ITI, LLC, GLOBAL TEL*LINK CORPORATION
Assigned to GLOBAL TEL*LINK CORPORATION, 3V TECHNOLOGIES INCORPORATED, VALUE-ADDED COMMUNICATIONS, INC., DSI-ITI, LLC reassignment GLOBAL TEL*LINK CORPORATION RELEASE OF PATENT SECURITY AGREEMENT Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH reassignment CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH PATENT SECURITY AGREEMENT Assignors: 3V TECHNOLOGIES INCORPORATED, DSI-ITI, LLC, GLOBAL TEL*LINK CORPORATION, VALUE-ADDED COMMUNICATIONS, INC.
Assigned to GLOBAL TEL*LINK CORPORATION, DSI-ITI, LLC, VALUE-ADDED COMMUNICATIONS, INC., 3V TECHNOLOGIES INCORPORATED reassignment GLOBAL TEL*LINK CORPORATION RELEASE OF PATENT SECURITY AGREEMENT Assignors: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG PATENT SECURITY AGREEMENT (SECOND LIEN) Assignors: 3V TECHNOLOGIES INCORPORATED, DSI-ITI, LLC, GLOBAL TEL*LINK CORPORATION, VALUE-ADDED COMMUNICATIONS, INC.
Assigned to CREDIT SUISSE AG reassignment CREDIT SUISSE AG PATENT SECURITY AGREEMENT (FIRST LIEN) Assignors: 3V TECHNOLOGIES INCORPORATED, DSI-ITI, LLC, GLOBAL TEL*LINK CORPORATION, VALUE-ADDED COMMUNICATIONS, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42221Conversation recording systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/283Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/683Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/685Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using automatically derived transcript of audio data, e.g. lyrics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/68Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/686Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title or artist information, time, location or usage information, user ratings
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2201/00Electronic components, circuits, software, systems or apparatus used in telephone systems
    • H04M2201/40Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition

Definitions

  • the instant invention relates to visitation sessions occurring in a controlled-access environment, such as a correctional institution.
  • the instant invention relates to a system and method for managing and monitoring visitation sessions.
  • Typical visitation procedures in a jail setting are created to balance allowing the inmate to have a quality visit with reducing the likelihood of undesirable or inappropriate behavior by both inmates and their visitors.
  • certain individuals such as convicted felons, victims, jail employees, co-defendants, former inmates, and the like are normally either not permitted visitation rights, or are permitted only restricted visitation rights. Additionally, individuals may be required to consent to background screening, personal body searches, and other intrusive measures in order to visit an inmate.
  • inmates are permitted to have a list of approved visitors. This list may be periodically revised, or it may be permanent. The purpose of the list is not to punish or restrict the inmate to only certain visitors, but rather to reduce the workload of the institution staff tasked with researching and approving each visitor on the list. By providing an inmate with a list of approved visitors, those approved visitors can visit the inmate without having to be repeatedly “cleared” by corrections staff prior to each visit. Some institutions may further restrict these lists, for example by allowing visitors to appear on only a certain number of inmates' lists at any given time. The presence of a pre-approved list of visitors also allows each visit to reduce security risks, as the individual has already been researched and approved. Accordingly, visits by visitors on the pre-approved list can be more efficient and can occur with more regularity.
  • Visitations between inmates and the general population can generally occur in one of several methods.
  • the simplest method, but also the most risk prone, is a face to face contact visit.
  • inmates and visitors are generally located in a common area, supervised by Corrections Officers.
  • the inmates and visitors may sit at conference type tables, and may be permitted limited contact, such as hugging or handholding.
  • this is the most desirable form of visit from both the visitor's and inmate's points of view, it is also the hardest to control.
  • contraband including drugs, money, and weapons could be introduced into the secure prison environment through face to face contact visits. Additionally, it is difficult for corrections officers to enforce rules that allow only certain visitors to visit certain inmates when all inmates and visitors are in a common location.
  • Another form of visitation involves placing a physical barrier between the inmate and the visitor.
  • the individuals are face to face, but usually separated by a transparent material, such as security glass or Plexiglass.
  • the booths are semi-private, with partitions or walls between each visitor and inmate. Physical contact is not permitted between the inmate and the visitor. Communication can be made via normal acoustic transmission through holes in the glass.
  • One common addition to this scenario is to place private telephone handsets on each of the visitor side and the inmate side. Once both parties have picked up the handset, they can communicate via the electronic amplification of the phone. Where communication is by telephone handset, there often are no longer holes in the barrier between the inmate and visitor. Both of these forms of visitation still present the difficulty of and risks associated with allowing the general public into the secured prison environment.
  • visitation typically employed only by the largest of detention centers
  • remote video visitation In this form of visitation, inmates and visitors are in physically separate locations, but are electronically connected via technology analogous to closed circuit television and telephone handsets or speaker phones. This type of visitation completely eliminates the potential for contraband to enter the facility, as the visitors never need be brought behind the secure gates of the prison.
  • OMS Offender Management System
  • each type of visitation described above can be viewed as addressing some of the shortcomings present in the other types of visitation. For example, in comparison to contact visitation, having an inmate and visitor physically separated by a barrier will reduce, but may not eliminate, the potential to pass contraband between the visitor and the inmate. By using remote video visitation however, the risk of passing contraband between the visitor and the inmate is totally eliminated. Further, the remote video visitation approach is less intrusive to the visitor, as the visitor no longer needs to be physically searched prior to entering a secure area.
  • the present invention provides a method of managing visitation in a controlled-access environment.
  • the method generally includes the steps of: accessing a visitation control system including a visitation session scheduling interface, a plurality of communications devices, a switching interface, and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation
  • the set of rules governing visitation in the controlled-access environment may include one or more operational rules (e.g., rules of general applicability or applicable to a particular class of individuals, rather than applicable to a specific individual).
  • the step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment may, for example, include verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.
  • the method optionally includes storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system.
  • One or more visitation rules associated with a single user of the visitation control system may be defined, and these visitation rules may be associated with a demographic information record.
  • the step of establishing communication between the first party to the visitation session and the second party to the visitation session will include establishing at least an audio connection between the first party and the second party through the visitation control system. This may be accomplished, for example, by connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface. Alternatively, both an audio connection and a video connection may be established between the first party and the second party through the visitation control system. The communication between the first party and the second party may be terminated at the conclusion of a preset period of time.
  • Whether or not a visitation session is to be monitored may be determined by assessing whether the visitation session meets at least one defined visitation session monitoring criterion. While monitoring the visitation session, the present invention may detect a violation of one or more rules governing visitation in the controlled-access environment and thereafter terminate the communication between the first party and the second party. Alternatively, rather than terminating the communication, the present invention may notify a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
  • the method further includes assigning an identification code to at least one of the first party and the second party.
  • the identification code may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system.
  • the method may include receiving a biometric input measurement from at least one of the first party and the second party and associating the received biometric input measurement with the respective party.
  • the biometric input measurement may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system.
  • the biometric input measurement may be a fingerprint, a voice print, or any other suitable biometric measurement.
  • a system for managing visitation in a controlled-access environment generally including: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including at least one software program controlling the switching interface, at least one software program to schedule a visitation session, and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session.
  • the visitation controller typically establishes at
  • At least one of the first authentication interface and the second authentication interface may include a biometric interface, such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface.
  • a biometric interface such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface.
  • at least one of the first authentication interface and the second authentication interface may include an identification code input interface.
  • the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.
  • the at least one monitoring devices typically enables at least near real-time monitoring of the visitation session.
  • the at least one monitoring device may include a recording device to record the visitation session.
  • both the first communications device and the second communications device are internal to the controlled-access environment. In other embodiments of the invention, one of the first communications device and the second communications device is external to the controlled-access environment.
  • the external communications device may be coupled to the visitation controller via the Internet.
  • the system optionally includes at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session. It is contemplated that the at least one visitation scheduling client may be external to the controlled-access environment, and may further communicate with the visitation controller via the Internet.
  • the present invention advantageously reduces the paperwork burden on correctional facility staff to “clear” outside parties for visitation sessions.
  • Another advantage of the present invention is that it improves compliance of visitation sessions with rules governing visitation in a controlled-environment.
  • FIG. 1 is a block diagram of a visitation control system according to an embodiment of the present invention.
  • FIG. 2 is an exemplary block diagram of the visitation control unit shown at the center of FIG. 1 .
  • FIG. 3 is a block diagram of an application server that may be incorporated into a visitation control unit according to the present invention.
  • FIG. 4 is an exemplary block diagram of the storage devices depicted in FIG. 1 .
  • FIG. 5 is a flowchart illustrating steps that may be carried out in scheduling a visitation session.
  • FIG. 6 is a flowchart illustrating one embodiment of a process for conducting a visitation according to the present invention.
  • Visitation approaches described above also present the possibility of fraud (e.g., failures to follow established rules for visitation sessions).
  • One common effort to circumvent facility rules regarding visitation sessions is to involve more than one inmate and more than one visitor, performing a switch when the visit actually occurs. For example, suppose Visitor A is not permitted to visit inmate 1 but is permitted to visit inmate 2 . Conversely, suppose Visitor B is permitted to visit inmate 1 but not inmate 2 . Visitors A and B communicate ahead of time and schedule visits at the same time: Visitor A schedules to see inmate 2 , as permitted, and Visitor B schedules to see inmate 1 , as permitted.
  • the visitation management system advantageously provides functionality beyond the functionality provided by many OMS software packages.
  • the system may be installed and configured to function as a stand-alone system, where all inmates and visitors are manually entered directly into the visitation management system.
  • the visitation system according to the present invention may be integrated with an OMS that provides inmate and/or visitor information.
  • the system can also be integrated with an Inmate Telephone System, which may also provide inmate and/or visitor demographic information.
  • the present invention may be practiced in connection with any of the approaches to visitation described above, as well as any other type of visitation.
  • a visitation management system includes a monitoring device that permits one or more third parties, such as corrections officers or court officials, to monitor a visitation session between an inmate and a visitor.
  • the term “monitoring,” as used herein, encompasses both live (e.g., real time or near real time) monitoring, for example as by actively listening in on an ongoing visitation session, and recordation of visitation sessions for later review and/or processing.
  • live monitoring e.g., real time or near real time
  • recordation of visitation sessions for later review and/or processing.
  • One suitable post-processing system and methodology is disclosed in U.S. provisional application No. 60/901,342, filed Feb. 15, 2007, which is hereby incorporated by reference as though fully set forth herein.
  • the monitoring device may also be capable of playing back audio and/or video as appropriate.
  • the monitoring device could be a microphone, speakerphone, video camera, or the like. Combinations of various monitoring devices (e.g., a microphone and a video recorder) could also be employed. Of course, the monitoring device or devices may be either visible to the parties to the visitation session or hidden from their view.
  • the visitation management system typically includes one or more databases or data stores, which may include one or more of the following types of data and records, discussed in further detail below: demographic information records, visitation schedule records, visitation log records, visitation recording and/or transcript records, configuration information, and operational rules.
  • the database may also include other types of information and/or records as desired or required by a particular implementation of the visitation management system.
  • database includes relational databases in which a plurality of data sets are associated with each other and stored, preferably as one or more records; the database may be stored in a single medium or may be stored in multiple media interconnected by a network.
  • the demographic information typically includes a variety of data utilized to create records of a plurality of individuals in a variety of role categories.
  • Role categories can include, without limitation, Inmates, Visitors, Employees, Official Visitors, Lawyers, and Clergy.
  • the demographic information will also typically include at least identification information, such as names, addresses, telephone numbers, and the like for the individuals in the database.
  • the demographic data record for an individual may also include or be associated with one or more visitation rules that govern visitation sessions involving that individual.
  • Visitation rules may include, for example, permitted to visit, permitted to be a visitor, blocked from visiting, must record, must not record, must be supervised, must be private, time limits, restrictions on visitation sessions by time and/or day, and the like.
  • the database may also include visitation schedule records, for example a calendar that reflects open and filled visitation “slots.”
  • a scheduled visitation session e.g., a filled visitation “slot” can consist of one or more inmates visiting with one or more individuals, and may be a one time event (e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoccurring series of events (e.g., the first of every month from 2:30 PM until 3:00 PM).
  • Scheduling of a visitation session can be initiated by an inmate, by correctional staff, or by the general public (e.g., a prospective visitor from outside the correctional institution).
  • Scheduled visitation sessions may take into account factors such as the inmate's daily schedule, the inmate's allowed visitor list (e.g., by applying visitation rules stored or associated with the inmate's demographic data record), the facility's visitation schedule, and resource availability (e.g., the availability of visitation booths or remote video visitation stations for use by the inmate and/or the visitor).
  • scheduled visitation sessions can be altered (e.g., moved to a different date or time) or deleted entirely through a visitation session scheduling interface, which may be either locally or remotely located.
  • the visitation session scheduling interface may be accessed via a wide area network (WAN), such as the Internet.
  • WAN wide area network
  • the present invention may also provide the ability to display or print a summary visitation schedule for any arbitrary time period, such as hourly, daily, weekly, monthly, and the like.
  • the visitation management system can accommodate both direct entry of scheduled visitation sessions, as well as use in a master/slave configuration where the schedule can be driven by an external system.
  • visitation sessions may be scheduled by the public via a publicly-accessible web site or through an automated telephone system connected via the public switched telephone network (PSTN).
  • PSTN public switched telephone network
  • the visitation management system also preferably stores a history of visitation sessions within the database (referred to herein as “visitation session logs,” “visitation session records,” or “visitation session history”), including information about at least the inmates, visitors, and resources involved in each visitation session.
  • a transcription and/or recording of the visitation session can also be stored or associated with the visitation session log.
  • each visitation session log may be assigned a unique identifier (e.g., a number or alphanumeric sequence).
  • the visitation session logs can be queried in a variety of ways and by employing a variety of different search criteria, such as day, inmate, resource, visitor information, or any combination thereof, which makes visitation session log queries a desirable feature of the present invention.
  • different items are often considered contraband in different sections of a correctional facility. Inmates can be very resourceful in getting around facility rules to pass an item from an inmate living in a section where the item is not considered contraband to an inmate living in a section where the item is considered contraband.
  • a corrections officer could use the visitation session logs to trace the origin of the contraband to the first inmate.
  • a corrections officer could view all visitation session records for a particular visitation resource (e.g., a given visitation booth) and determine which inmates were passing contraband between each other by scheduling visits right after each other (e.g., Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden item hidden in the booth for Inmate B to get during the 4:15 to 4:30 visitation time).
  • a visitation session history report can also be used to determine odd patterns in visitation, such as the same visitor visiting many inmates, or a correlation between specific inmates and visitors and other events in the facilities, such as drug finds, contraband detection, or other misbehavior.
  • Configuration information may also be maintained within the visitation management system and stored within a database.
  • Configuration information includes non-visitation related items, such as the number of phones connected to the visitation management system, where they are located, and a unique name or identifier assigned to each of them. It may also include configuration information about the telephony equipment used, such as board manufacturer, serial numbers, technical data, and the like.
  • Operational rules are still another type of data that may be stored in one or more databases included in a visitation management system according to the present invention. Operational rules typically dictate the conditions under which visitation sessions are permitted to occur. Operational rules are similar to the visitation rules that may be associated with individuals in the demographic database. Operational rules, however, apply across several individuals (e.g., to all individuals in the demographic database or to all individuals in a particular class/role), rather than only to a particular individual. Operational rules can include, but are not limited to, time limits for visitation sessions, visitation count limits, person restrictions, time of day, day of week, authentication required, recording required, monitoring allowed, notifications required, and others. For example, operational rules could exist to limit certain classes of inmates to visitation sessions only once a week for thirty minutes, while other classes of inmates are permitted visitation sessions twice a week for one hour.
  • the visitation management system preferably enforces operational rules and individual visitation rules both during scheduling of visitation sessions, thereby prohibiting the scheduling of visitation sessions in violation of the rules, as well as during visitation sessions.
  • the visitation management system may enforce a time limit operational rule by electronically cutting off the visitation session and/or notifying interested parties, such as staff and corrections officers, after a preset time limit for the visitation session has elapsed or if an unauthorized or impermissible party attempts to join the visitation session.
  • the visitation management system is capable of taking direct input from a human operator, for example in a stand alone installation.
  • the visitation management system can operate in a master/slave arrangement where another system, such as an OMS or an Inmate Telephone System, serves as master, with the visitation management system receiving data therefrom, which may save time and personnel resources that would otherwise be required for data entry to the visitation management system.
  • the disclosed visitation management system can authenticate the parties involved in the visitation session according to one or more of a plurality of authentication methods. For example, when using a handset-based approach to visitation (either remote or face to face with a barrier), when the inmate picks up the handset, the inmate may be prompted to enter a telephone ID number or visitation ID number, known only to the inmate. Similarly, when the visitor picks up the handset, the visitor will be prompted to enter in an ID number known only to the visitor. It is only after successful verification of these ID numbers that the visitation session may proceed.
  • the visitation management system to which the handsets are coupled, will only permit communication between the handsets after valid authentication of both parties to the visitation session. Therefore, communication cannot proceed until authorized. It is also at this point that monitoring of the visitation session can occur.
  • a unique one time identification code is generated for each visitor. This code may be produced by the system just prior to the visitation session taking place, immediately after identity verification of the visitor (e.g., a photo-ID check) has been performed. Typically, the identification code will be valid only for a preset time period (e.g., the identification code will expire after a certain amount of time). The identification code also preferably expires after it is used once for authentication, thereby reducing the likelihood that an authorized visitor can successfully pass an identification code to an unauthorized visitor.
  • Inmate validation can be performed in a similar fashion, or the inmate can use a Telephone ID (TID) number that is shared with the facility's inmate phone system. Inmates generally will not share their TIDs with each other, as it would allow other inmates to make fraudulent charges to the account associated with the TID, making it a suitable identifier to authenticate an inmate to a visitation session.
  • TID Telephone ID
  • authentication may be performed by using biometric devices, such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification.
  • biometric devices such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification.
  • biometric techniques can be used in place of, or in addition to, the identification number based authentication methodology described above. For example, either or both of the inmate and the visitor may be required to undergo two-factor identification, including input of an identification number and a fingerprint scan.
  • a visitation session typically begins when a corrections officer initiates a visit in the visitation management system. Visitation sessions may also begin automatically when an inmate and visitor both authenticate into a scheduled visitation session. A visitation session will generally continue until it is terminated by a corrections officer, by either of the parties to the visitation system, or by the visitation management system at the expiration of a preset visitation session time limit, which may be established according to one or more operational rules. The visitation session may also be terminated if the visitation management system detects a violation of an operational or individual visitation rule during the course of the visitation session. The system may also provide visual or auditory feedback to a corrections officer when a visitation session has expired or otherwise been terminated. The visitation management system will disconnect all audio or audio/video connections at the expiration of a visitation session.
  • the visitation management system may permit corrections staff at a facility to view and/or listen to visitation sessions currently in progress from a computer terminal or other suitable device.
  • a corrections officer can select one or more ongoing visitation sessions to monitor, and may be provided with a real time or near real time audio and/or video feed of each monitored visitation session, depending on the type of visitation session.
  • an Official Visitor e.g., an individual subject to a “do not monitor” operational or individual visitation rule, such as the inmate's lawyer
  • the corrections officer would not be able to monitor the conversation.
  • the corrections officer may also participate in the visitation session by talking to one or both parties thereto.
  • the corrections officer may also be able to terminate the visitation session at any time through the visitation management system, either with or without warning to the parties to the visitation session, for example upon detecting that a rules violation has occurred during the visitation session.
  • the visitation management system may also be configured to permit the corrections officer to transfer a live audio and/or video feed of the visit to any phone, computer terminal, video screen, or the like, be it inside the facility or outside the facility, for monitoring of the visitation session by one or more additional parties.
  • the visitation management system may be configured to transfer monitoring to cell phones of investigators, district attorneys, or others. Typically, the transfer of the monitoring would be undetectable by either the inmate or the visitor.
  • the transferee party will have the same ability as the corrections officer to join in or terminate the visitation session.
  • the audio and/or video of the visit may be recorded, if desired (and permitted by the rules).
  • the recorded data may be encoded into a computer-readable format, and may be stored either on a file system or within a database.
  • the visitation session record for each visitation session may be assigned a unique identifier that may be used to correlate the participants in the visitation session, the date and time of the visitation session, the location of the visitation session, what corrections officers verified the identities of the participants to the visitation session, and other relevant details.
  • the recording of the visitation session and the data associated with the visitation session record can later be searched for and retrieved from within the visitation management system. Searching for visitation sessions can be completed based on one or more of a plurality of criteria including, without limitation, date and/or time of the visitation session, inmate name, inmate ID, visitor name, visitor ID, visitation booth, visitation area, and any combination thereof. Further, the recording of the visitation session can preferably be played back at any time and from any location that has access to a computer or phone system that can connect to the visitation management system.
  • the corrections officer may be provided the ability during playback of the visitation session to annotate notes and transcriptions, which may be stored or associated with the visitation session record.
  • any recording of the visitation session can be downloaded to removable media, such as a CD or DVD, for playback on many standard devices.
  • removable media such as a CD or DVD
  • the audio file of a recorded visitation session can be written to a CD for playback in any standard CD player. This would permit, for example, the visitation session to be played back in court if necessary.
  • recordings of visitation sessions can be stored on removable media in binary format, advantageously allowing recordings of many visitation sessions to be stored on one disk for playback in a computer.
  • Binary recordings also advantageously provide the ability to protect the recording with a security wrapper and/or watermarking process to alleviate tampering concerns.
  • the audio of the visitation session can also be transcribed into text by a manual, human-driven process, by real time or near real time audio transcription software, or in a batch software process that can transcribe the audio after the visitation session has concluded.
  • the transcript of the visitation session can then advantageously be indexed and searched along with other database records.
  • the transcript of the visitation session will be stored or associated with the visitation session history, and can be accessed and printed from within the visitation management system.
  • rules can be configured in the visitation management system to flag certain keywords, phrases, or topics of conversations. These rules can be used to notify interested parties when a transcript meeting the rules is stored in the visitation management system (e.g., a rule that notifies a corrections officer whenever the terms “gang” and “cocaine” are both uttered in a visitation session).
  • FIG. 1 depicts a block diagram of a visitation management system 100 according to an embodiment of the invention, including the communications connections between the components thereof.
  • the visitation control unit 102 which is depicted in further detail in FIG. 2 , is connected to each of the other components of the visitation management system.
  • the visitation control unit may communicate via a local area network (LAN) 104 for local resources, such as data storage 106 (shown in further detail in FIG. 4 ), control stations 108 , video communication devices 110 , and audio communication devices 112 .
  • the LAN may, but need not be, exclusively Ethernet technology, and thus may employ any type of communication medium and protocol, including analog, voltage based transmission.
  • the wide area network (WAN) 114 provides a dedicated, private link between the visitation control unit and remote devices.
  • the Internet 116 can be utilized to provide access to remotely distributed control stations, scheduling clients 118 , and home visitation devices 120 .
  • the speed requirement of the Internet link is dependent on the number of simultaneous connections supported.
  • the visitation control unit is the central processing center for the visitation management system 100 .
  • the processing power for the visitation control unit comes from standard personal computer (PC) components, configured in a more robust and redundant server role. This generally means higher quality components, with redundant power supplies, hard drives, and other components, but a standard, off-the-shelf (e.g., consumer-grade) system could also be utilized.
  • PC personal computer
  • the visitation management system is designed to work with a variety of hardware, such as Intel or AMD based processors, and Operating Systems, such as Microsoft Windows, Linux, Mac OS, and the like.
  • the visitation management system itself is independent of the operating system in which it is operating.
  • Each server depicted in FIG. 2 can be construed as either a physical hardware device or a virtual server.
  • the number of physical hardware machines can be scaled to match the number of simultaneous user connections desired in the visitation management system. Additionally, if space and/or power consumption are considerations, the visitation management system can be scaled down to reduce these concerns.
  • the servers that collectively make up the visitation control unit are typically each connected to a central network bus 210 , which will most commonly be an Ethernet connection.
  • a central network bus 210 which will most commonly be an Ethernet connection.
  • the entire visitation management system may be shielded from the rest of the network at an institution by a router or firewall, which can, of course, be either hardware or software based.
  • the video server 212 connects to each of the video visitation devices and performs the necessary electrical connections and switching required to connect two or more visitation station units together for a visitation session.
  • the video server can also send the audio and/or video feed to any other computer or device coupled to the visitation control unit for monitoring, recording, or other purposes.
  • the video server is capable of performing real time translation of video protocols to allow for different video visitation hardware to be utilized in different locations.
  • One of ordinary skill in the art will recognize how the video server establishes a video conference between parties to a visitation session, including, in some instances, a monitoring party.
  • the audio server 214 is the audio analogue to the video server.
  • the audio server connects audio devices, such as standard telephones, together and can send the output to any additional devices connected to the visitation control unit for monitoring, recording, or other reasons.
  • the phone devices can be connected to the server via two wire copper connections, via twisted pair digital connections, wireless/cordless connections, or other techniques that will be familiar to one of ordinary skill.
  • the audio server has the capability to detect and respond to DTMF based events, flash hook events, and any other event that can be generated by a telephone device.
  • the audio server may also be able to ring the telephone devices.
  • the audio server may also be connected to outside telephone lines to route audio to an outside source, such as a land line or cellular phone.
  • the web server 216 is typically a standard device, which may run Apache, Microsoft Internet Information Server, or other web server software.
  • the primary function of the web server is to route requests and other communications from visitation control stations, remote visitation scheduling clients, and home visitation devices into the appropriate destination within the visitation control unit.
  • the web server can also serve as a maintenance point into the visitation control unit for servicing and configuring the system.
  • the web server will be connected to both the public Internet and the internal network of an organization (e.g., a private intranet).
  • the application server 218 functions as the primary center of logic processing in the visitation management system.
  • a block diagram of the application server is shown in FIG. 3 .
  • the application server may be a common PC based machine with one or more CPU's 310 connected via a bus 314 to other peripherals including, without limitation, a network card 316 , analog modem 318 , keyboard 320 , mouse (not shown), and a monitor 322 .
  • both system memory 322 consisting of RAM, and other data storage 324 , e.g., magnetic, optical, or flash memory may be connected to the bus.
  • System memory 322 contains the runtime environment of the application server. While the preferred embodiment of the device contains an operating system 330 (e.g., Windows, Linux, or another operating system), and a Java virtual machine 332 , the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.
  • an operating system 330 e.g., Windows, Linux, or another operating system
  • a Java virtual machine 332 the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.
  • Internal non-volatile storage 324 preferably, but not necessarily, a hard drive, is used to store the operating system, application files, temporary files used during the operation of the system, and as a temporary storage space for recordings of visitation sessions. It is contemplated that recordings of visitation sessions will periodically be moved to another location, for example by an automated scheduled file transfer process, though recordings of visitation sessions may also be stored on the application server without departing from the spirit and scope of the present invention.
  • databases in addition to the storage on the application server, there may also be one or more databases and associated Network Attached Storage (NAS) devices connected to the application server via the network.
  • NAS Network Attached Storage
  • database is typically used herein to refer to a relational database, the term is also intended to encompass a relational database application or a remotely defined data store.
  • the remotely defined data store can be an external system, such as an Inmate Telephone System, an Offender Management System, or other information system application.
  • the data store is not a formal data store at all, but rather is a real time link to live data.
  • the visitation management system a variety of such data stores and databases are simultaneously employed in a heterogeneous environment.
  • the database will typically provide access to a variety of different types of data records.
  • data related to an inmate including name, commitment information, address, and the like may be linked to the majority of the remaining data types.
  • identification records may be entered directly into the visitation management system or, alternatively, loaded from an external system such as an OMS or Inmate Telephone System.
  • Scheduling data is typically generated only within the visitation management system and consists of visitation events that have not yet occurred (e.g., visitation schedule records) as well as historical visit information (e.g., visitation session records).
  • a visitation schedule record may include links to all involved parties, including inmates, visitors, and correctional staff (if correctional staff are needed). It may also include links to other resources that will be used in the visitation session, such as inmate visitation booths, telephone reservations, data bandwidth guarantee reservations, as well as other metadata about the visitation session.
  • a separate logical data store can be used to store visitation session records, which may include a link to the original visitation session reservation (e.g., the visitation schedule record), any recordings or transcripts of the visitation session, and a list of the actual resources used, if they differed from the resources originally reserved for the visitation session.
  • the data is preferably stored in such a way as to facilitate long term storage and easy data reporting capabilities.
  • a fourth type of database or data store may include configuration information for the visitation management system itself. As described above, this information may include the connection details of all the various hardware devices connected, such as the video and audio servers, web servers, application servers, and remote devices.
  • the configuration data allows the system to be configured with a variety of different hardware types and manufacturers, enabling the application to run under a variety of different configurations depending on the needs and requirements of a given installation of the visitation management system.
  • a fifth data store is the Network Attached Storage (NAS) device that may be used to store the actual audio and/or video recordings of visitation sessions.
  • NAS Network Attached Storage
  • the NAS is preferably a very large storage device that can be expanded as the need arises to accommodate more live (e.g., on-line) storage of visitation session data.
  • Various settings can be configured as to the lifespan of the data contained within the NAS. An infinite lifespan of data will, of course, require an infinite amount of storage, so such controls are necessary to limit or reduce the size of the NAS required.
  • the capability could also be provided to export visitation session data off the live storage mechanism into permanent off-line storage, such as optical media for archival purposes or for presenting as evidence in court or aiding in the investigation of criminal activity.
  • standard analog inmate telephones are preferably used for audio communication during face to face and remote visitation sessions. They could also be used for video visitation sessions if the selected video communication device does not provide audio services.
  • the phones in the visitation management system according to the present invention are coupled to the audio server (e.g., the visitation control unit) rather than being directly connected to each other in pairs.
  • the audio server e.g., the visitation control unit
  • they will typically be connected to the server via a 66 block or other interface block.
  • the phones since they are not connected directly together, require the audio server to provide line power and logical switching services.
  • the phones can easily be changed in real time to be connected to other devices. This advantageously increases the flexibility of the visitation management system, permitting such configurations as a many-to-many connection between telephones, while also providing a convenient controller (e.g., the visitation control unit).
  • smart phones may be used instead of, or in addition to, analog phones, similarly connected over a network to the audio server.
  • the addition of smart phones could facilitate implementation of additional features in the visitation management system, such as authentication of parties to a visitation session as described above (e.g., via biometric identification devices or card readers), payment services (e.g., via credit card readers for ‘for-pay’ visitations), or deposits into an inmate accounting system.
  • Smart phones could also introduce additional interactive services, such as display readouts for elapsed and remaining times, or other information.
  • the phones used in the visitation management system of the present invention preferably are not connected for communication until the controlling hardware (e.g., the visitation control unit) and the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface. This allows for precise timing of visits, authentication, and the ability to interrupt the visit by a third party.
  • the controlling hardware e.g., the visitation control unit
  • the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface.
  • Video visitation devices may be connected in a similar manner as phone devices-that is, via a central video server incorporated into the visitation control unit, rather than directly together.
  • the video devices function similarly to the audio devices.
  • video conferencing stations can be located in the same building connected via a LAN, coupled across a relatively short distance (e.g., within the same town) via a WAN, or coupled across a much larger distance (e.g., across several states) via an extended WAN.
  • the video conferencing devices have the capability to split audio signals from video signals to transmit the two signals to two different devices. This capability is may be used, for example, when connecting from a dedicated video conference station that supports both audio and video to a remote web-cam for video transmission via the Internet and a standard telephone for audio transmission via telephone lines.
  • the computers Connected to the application server is a theoretically unlimited number of local client computers.
  • the computers are running a local web browser, such as Microsoft's Internet Explorer, or Mozilla's Firefox.
  • the browsers interpret user interactions and inputs and transmit these interactions and inputs to the application servers, where the interactions and inputs are used to control the audio and video servers.
  • Clients are also able to administer the system, such as setting up resources and viewing, inserting, and deleting inmates or visitation sessions.
  • the web application also provides mechanisms to view the current state of the system.
  • the “current state of the system” is all active visitation sessions happening within the visitation management system.
  • the amount of data visible to the user may be limited by the user's role. For example, some corrections officers may be able to see only that an inmate is in a visitation session, while other corrections officers could see where the visit is occurring and what type of visitation session it is (e.g., telephonic, remote video, in person). Still other classes of users may be able to listen in on and/or view the visitation session, as well as terminate or extend the visitation session.
  • the visitation management system may be part of a larger application, such as an Offender Management System or Inmate Telephone System, or it may be a standalone application depending on client configuration and modules installed. While the visitation management system is, in some embodiments, a web-based system, it is also contemplated that the functionality of the system can be delivered via a variety of application platforms, including, but not limited to, client/server or rich client.
  • a facility may provide access to the visitation management system via the Internet or other communication network.
  • remote clients typically also running web browsers such as Microsoft's Internet Explorer or Mozilla Firefox, will be able to access the visitation management system as though locally connected to the visitation management system.
  • One potential user of a remote client might be an investigator, not located at the correctional facility, who is interested in all visitation sessions involving a particular inmate. This investigator could be notified automatically by the visitation management system when a visitation session is occurring, and the investigator can log on to the visitation management system from any Internet-connected remote location and device to view and/or listen to the visitation session in progress.
  • a special type of limited client access can also be provided to the general public in order to schedule and conduct visitation sessions via a home personal computer.
  • the visitor uses a web camera connected to the visitor's home PC, which is connected to the Internet.
  • the individual logs on to the visitation management system via the world wide web to request and schedule visitation sessions, as well as to actually participate in a visitation session.
  • Audio visitation sessions would work in a fashion similar to an inmate telephone call, though the visit is at a predetermined time and is mutually initiated.
  • a video visitation session will use the web camera to transmit video, and the monitor will display video. Audio can be transmitted via a standard phone line or via computer speakers and microphone.
  • visitation sessions will also be able to be monitored, transcribed, and/or controlled from any other client connected to the visitation management system.
  • the maximum number of simultaneous remote visitation sessions is controlled by available bandwidth coming from the facility, as well as the physical number of video or audio devices that exist.
  • special dedicated terminals may be provided outside the correctional facility, but still within the correctional enterprise's network, to perform the same or similar functions.
  • a significant advantage of the visitation management system is its ability to integrate with a variety of other solutions for the corrections market.
  • Services can be provided to integrate directly at the database level, where inmates and other data can be moved seamlessly from one system to another (e.g., between an OMS and the visitation management system).
  • Services can also exist to integrate at a higher level, such as the visitation management system sending messages on events occurring to external systems. For example, a visitation session involving a particular inmate may trigger a message to an outside system, such as an investigator, District Attorney, or court system. Integration may also exist to connect visitation management systems at several correctional facilities to allow for facility to facility visitation sessions.
  • FIGS. 5 and 6 are flowcharts of a visitation process using the visitation management system. Scheduling of a visitation session is initiated by either an inmate or by the visitor. The visitation session can be scheduled far in advance, and is made according to the operational rules of the correctional facility. For example, a correctional facility may require that an inmate only has three visitation sessions per month or that only approved visitors may participate in visitation sessions. Regardless of how the visit schedule is created (e.g., whether initiate by the inmate or initiated by the visitor), the operational rules are preferably enforced by the visitation management system to ensure that only compliant visitation sessions are scheduled.
  • a visitor may initiate the scheduling process. Often times, a visitor must be approved before a visitation session can be scheduled. A visitor can place himself or herself on a waiting list to be approved by the facility if the visitor is not already on the list. Individual combinations of visitors and inmates may be approved. Alternatively, certain visitors may be approved to visit any inmate.
  • the visitor can schedule a visitation session by browsing for available days and times. Available visitation sessions may be presented by taking into account the facility's visiting hours, the inmate's schedule, and other facility rules as reflected in the visitation schedule records. An option could also exist to auto-pick the first available time for a visitation session.
  • a record of the visitation session is created in the appropriate database or data store detailing at least the participants in the visit (e.g., the name of the inmate and the name, address, and phone number of the visitor), and, in some embodiments of the invention, the resources that will be required to participate in the visit, such as visitation booths, video devices, or room reservations.
  • the visitor is notified of the confirmed visitation session date and time and may be given a confirmation code that uniquely identifies the scheduled visitation session.
  • the scheduled visitation session can be modified by the inmate, the visitor, or an administrative individual. Modifications can include changes in date and/or time, resource changes, or a complete cancellation of the visitation session.
  • the visitor Upon any change to the reservation, the visitor must be notified of the change. This can be done via email, postal mail, or via telephone.
  • the record of the visitation session may also be updated.
  • both the inmate and the visitor must be located in the proper place for the visit.
  • the individuals involved in the visitation session both inmate and visitor, must be positively identified by a corrections officer as well as authenticated to the visitation session as described herein.
  • it is easy to positively identify an inmate as inmates are required to have identification on them at all times.
  • the inmate can further be positively identified by requiring a unique telephone or visitation session identification code to be entered into a phone or video device before the visitation session can proceed. Identifying individuals of the general public can be more problematic, but facility rules can be set up to require a state or federally issued identification card to be shown before the visitation session can commence.
  • a unique one-time code can be generated that will only allow the visitor to participate in the visitation session the visitor was scheduled for. This helps prevent a common scenario where visitors try to circumvent facility rules to visit someone they are not permitted to visit. Additionally, identification and authentication can also be performed via biometric devices, such as fingerprint readers.
  • the visitation management system will initiate a timer to calculate the elapsed and remaining time of the visitation session.
  • any individual with the proper rights and privileges can view visitation sessions in progress, listen in on them, or speak to one or both parties to the visitation session.
  • Appropriately credentialed users may also be able to terminate the visitation session or grant additional time to the parties.
  • the visitation session may also be recorded so that individuals can review a recording and/or transcript of the visitation session at a later time.
  • participant may be notified of the time remaining in the visitation session.
  • a prompt such as “You have 3 minutes remaining for this visit” can be played over a telephone or other audio device or overlaid on the screen for a video visit.
  • the visitation management system automatically terminates the logical device connections (e.g., the connection between telephone or video devices) to ensure that no further communication can take place between the inmate and the visitor.
  • the visitation management system then creates a record of the completed visitation session as described herein.
  • the system can start a transcription process to convert any recorded audio into searchable text.
  • the inmate is escorted back to his or her cell, and the visitor can leave the facility at this point.
  • the visitation booths are now available for use for other visitation sessions.
  • the visitation session record becomes available for retrieval at a later point by corrections officers, police officers, investigators, and others who may require access.
  • the visitation management system advantageously allows for searching of past visitation sessions via such criteria as inmate name, visitor name, visitation session locations, dates and times, content of the visitation sessions (e.g., topics discussed), and unique visit IDs.
  • the application server queries the database for results matching the user's request.
  • the results will be formatted and presented back to the user, typically via the web browser.
  • the user can then export the details of one or more of the output visitation sessions, or the audio and/or video of the visitation session, if available, to external media, such as CD or DVD.
  • the media can be presented in court, if needed, to serve as evidence.
  • the term “party,” as used herein, should not be construed to refer to only a single individual, but rather is intended to encompass one “side” of a visitation session (e.g., in a visitation session between an inmate and the inmate's family, the inmate is a party and the family is a party).

Abstract

A method of managing visitation includes accessing a visitation control system including a visitation session scheduling interface, communications devices, a switching interface, and at least one authentication interface, defining rules governing visitation, requesting a visitation session using the scheduling interface, assessing whether the visitation session complies with the rules governing visitation, scheduling the visitation session if the visitation session complies with the rules, using the at least one authentication interface to authenticate a first party and a second party, establishing communication between the first party and the second party after authenticating both parties, and storing a record of the visitation session in a database. The record preferably includes at least information regarding identities of the first party and the second party. The visitation session may also be monitored (e.g., in real time, near real time, or by recording).

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is related to U.S. provisional application No. 60/901,342, filed Feb. 15, 2007 and U.S. application Ser. No. 11/706,431, filed Feb. 15, 2007. The foregoing are hereby incorporated by reference as though fully set forth herein.
  • BACKGROUND OF THE INVENTION
  • a. Field of the Invention
  • The instant invention relates to visitation sessions occurring in a controlled-access environment, such as a correctional institution. In particular, the instant invention relates to a system and method for managing and monitoring visitation sessions.
  • b. Background Art
  • In the correctional industry, inmate visitation is an essential part of rehabilitation of an inmate. Numerous studies have shown that visitation by friends and family can help reduce recidivism as well as prepare an inmate for life after prison. Since the vast majority of inmates are eventually released into the public, any steps to minimize the problems the individual may have upon re-entering public life are welcomed.
  • Typical visitation procedures in a jail setting are created to balance allowing the inmate to have a quality visit with reducing the likelihood of undesirable or inappropriate behavior by both inmates and their visitors. To this end, certain individuals, such as convicted felons, victims, jail employees, co-defendants, former inmates, and the like are normally either not permitted visitation rights, or are permitted only restricted visitation rights. Additionally, individuals may be required to consent to background screening, personal body searches, and other intrusive measures in order to visit an inmate.
  • In many institutions, inmates are permitted to have a list of approved visitors. This list may be periodically revised, or it may be permanent. The purpose of the list is not to punish or restrict the inmate to only certain visitors, but rather to reduce the workload of the institution staff tasked with researching and approving each visitor on the list. By providing an inmate with a list of approved visitors, those approved visitors can visit the inmate without having to be repeatedly “cleared” by corrections staff prior to each visit. Some institutions may further restrict these lists, for example by allowing visitors to appear on only a certain number of inmates' lists at any given time. The presence of a pre-approved list of visitors also allows each visit to reduce security risks, as the individual has already been researched and approved. Accordingly, visits by visitors on the pre-approved list can be more efficient and can occur with more regularity.
  • Visitations between inmates and the general population can generally occur in one of several methods. The simplest method, but also the most risk prone, is a face to face contact visit. In this type of visit, inmates and visitors are generally located in a common area, supervised by Corrections Officers. The inmates and visitors may sit at conference type tables, and may be permitted limited contact, such as hugging or handholding. Although this is the most desirable form of visit from both the visitor's and inmate's points of view, it is also the hardest to control. If inmates and visitors are not physically screened before and after visits, contraband, including drugs, money, and weapons could be introduced into the secure prison environment through face to face contact visits. Additionally, it is difficult for corrections officers to enforce rules that allow only certain visitors to visit certain inmates when all inmates and visitors are in a common location.
  • Another form of visitation involves placing a physical barrier between the inmate and the visitor. In this form of visitation, the individuals are face to face, but usually separated by a transparent material, such as security glass or Plexiglass. Generally, the booths are semi-private, with partitions or walls between each visitor and inmate. Physical contact is not permitted between the inmate and the visitor. Communication can be made via normal acoustic transmission through holes in the glass. One common addition to this scenario is to place private telephone handsets on each of the visitor side and the inmate side. Once both parties have picked up the handset, they can communicate via the electronic amplification of the phone. Where communication is by telephone handset, there often are no longer holes in the barrier between the inmate and visitor. Both of these forms of visitation still present the difficulty of and risks associated with allowing the general public into the secured prison environment.
  • Another form of visitation, typically employed only by the largest of detention centers, is remote video visitation. In this form of visitation, inmates and visitors are in physically separate locations, but are electronically connected via technology analogous to closed circuit television and telephone handsets or speaker phones. This type of visitation completely eliminates the potential for contraband to enter the facility, as the visitors never need be brought behind the secure gates of the prison.
  • All of the visitation types described above have in common that certain paperwork and research must be completed by the facility before the visitation session can occur. In some facilities, software, such as an Offender Management System (OMS), has automated part of the record keeping process, storing inmate information along with visitor information in the computer system. In more sophisticated OMS installations, the software can also perform basic enemy checking, employee checking, and past felony checking on visitors with the data already stored in the OMS database.
  • In addition, each type of visitation described above can be viewed as addressing some of the shortcomings present in the other types of visitation. For example, in comparison to contact visitation, having an inmate and visitor physically separated by a barrier will reduce, but may not eliminate, the potential to pass contraband between the visitor and the inmate. By using remote video visitation however, the risk of passing contraband between the visitor and the inmate is totally eliminated. Further, the remote video visitation approach is less intrusive to the visitor, as the visitor no longer needs to be physically searched prior to entering a secure area.
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention provides a method of managing visitation in a controlled-access environment. The method generally includes the steps of: accessing a visitation control system including a visitation session scheduling interface, a plurality of communications devices, a switching interface, and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation session database, the record of the visitation including at least information regarding identities of the first party and the second party. The set of rules governing visitation in the controlled-access environment may include one or more operational rules (e.g., rules of general applicability or applicable to a particular class of individuals, rather than applicable to a specific individual). The step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment may, for example, include verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.
  • The method optionally includes storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system. One or more visitation rules associated with a single user of the visitation control system may be defined, and these visitation rules may be associated with a demographic information record.
  • Typically, the step of establishing communication between the first party to the visitation session and the second party to the visitation session will include establishing at least an audio connection between the first party and the second party through the visitation control system. This may be accomplished, for example, by connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface. Alternatively, both an audio connection and a video connection may be established between the first party and the second party through the visitation control system. The communication between the first party and the second party may be terminated at the conclusion of a preset period of time.
  • It is also desirable to determine whether the visitation session is to be monitored and to monitor the visitation session in response to a determination that the visitation session is to be monitored. Whether or not a visitation session is to be monitored may be determined by assessing whether the visitation session meets at least one defined visitation session monitoring criterion. While monitoring the visitation session, the present invention may detect a violation of one or more rules governing visitation in the controlled-access environment and thereafter terminate the communication between the first party and the second party. Alternatively, rather than terminating the communication, the present invention may notify a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
  • In some embodiments, the method further includes assigning an identification code to at least one of the first party and the second party. The identification code may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. Alternatively, or in addition, the method may include receiving a biometric input measurement from at least one of the first party and the second party and associating the received biometric input measurement with the respective party. The biometric input measurement may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. The biometric input measurement may be a fingerprint, a voice print, or any other suitable biometric measurement.
  • Also disclosed herein is a system for managing visitation in a controlled-access environment, generally including: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including at least one software program controlling the switching interface, at least one software program to schedule a visitation session, and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session. The visitation controller typically establishes at least audio communication between the first communications device and the second communications device through the switching interface, and may establish both audio communication and video communication between the first communications device and the second communications device through the switching interface.
  • At least one of the first authentication interface and the second authentication interface may include a biometric interface, such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface. Alternatively, or in addition, at least one of the first authentication interface and the second authentication interface may include an identification code input interface.
  • Preferably, the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.
  • The at least one monitoring devices typically enables at least near real-time monitoring of the visitation session. For example, the at least one monitoring device may include a recording device to record the visitation session.
  • In some embodiments of the invention, both the first communications device and the second communications device are internal to the controlled-access environment. In other embodiments of the invention, one of the first communications device and the second communications device is external to the controlled-access environment. The external communications device may be coupled to the visitation controller via the Internet.
  • The system optionally includes at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session. It is contemplated that the at least one visitation scheduling client may be external to the controlled-access environment, and may further communicate with the visitation controller via the Internet.
  • The present invention advantageously reduces the paperwork burden on correctional facility staff to “clear” outside parties for visitation sessions.
  • Another advantage of the present invention is that it improves compliance of visitation sessions with rules governing visitation in a controlled-environment.
  • The foregoing and other aspects, features, details, utilities, and advantages of the present invention will be apparent from reading the following description and claims, and from reviewing the accompanying drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a visitation control system according to an embodiment of the present invention.
  • FIG. 2 is an exemplary block diagram of the visitation control unit shown at the center of FIG. 1.
  • FIG. 3 is a block diagram of an application server that may be incorporated into a visitation control unit according to the present invention.
  • FIG. 4 is an exemplary block diagram of the storage devices depicted in FIG. 1.
  • FIG. 5 is a flowchart illustrating steps that may be carried out in scheduling a visitation session.
  • FIG. 6 is a flowchart illustrating one embodiment of a process for conducting a visitation according to the present invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • While the visitation approaches described above address, to a certain extent, the problems of contraband and security within the prison, they can introduce issues with paperwork, research, and expense to the facility. Further, where the visitation session between the inmate and the visitor is conducted electronically, there is the potential to gather valuable information from the communication between the inmate and the visitor. For any information gathered to be of value, however, the parties in the communication need to be positively identified. In existing visitation approaches, positive identification is often difficult; often, the best that can be done is an educated guess based on paper logs, reports, and correction officer observations.
  • The visitation approaches described above also present the possibility of fraud (e.g., failures to follow established rules for visitation sessions). One common effort to circumvent facility rules regarding visitation sessions is to involve more than one inmate and more than one visitor, performing a switch when the visit actually occurs. For example, suppose Visitor A is not permitted to visit inmate 1 but is permitted to visit inmate 2. Conversely, suppose Visitor B is permitted to visit inmate 1 but not inmate 2. Visitors A and B communicate ahead of time and schedule visits at the same time: Visitor A schedules to see inmate 2, as permitted, and Visitor B schedules to see inmate 1, as permitted. After Visitors A and B are identified by the prison staff and are waiting to visit their respective inmates, however, they switch credentials or just simply switch seats to visit the inmates they are restricted from seeing. This type of visitation fraud is often occurs in large facilities where there are large numbers of visitors and inmates at any given time, making it difficult for corrections officers to individually recognize each of the inmates and visitors when monitoring the various visitation sessions occurring.
  • Another somewhat less serious form of visitation fraud involves inmates and visitors not observing time limits placed on visitation sessions, which are typically in the range of about fifteen to about sixty minutes. Prison resources are limited in nature, and only so many visits can be handled concurrently. Rigorously enforcing time restrictions makes better use of these resources, allowing more inmates the opportunity to participate in the visiting process. Of course, in a large facility, it requires considerable coordination by the prison staff to ensure that the visits do not extend past their allotted time, making it difficult for corrections officers to monitor time restrictions for all visitation sessions.
  • The visitation management system according to the present invention advantageously provides functionality beyond the functionality provided by many OMS software packages. The system may be installed and configured to function as a stand-alone system, where all inmates and visitors are manually entered directly into the visitation management system. Alternatively, the visitation system according to the present invention may be integrated with an OMS that provides inmate and/or visitor information. Of course, the system can also be integrated with an Inmate Telephone System, which may also provide inmate and/or visitor demographic information. It should further be understood that the present invention may be practiced in connection with any of the approaches to visitation described above, as well as any other type of visitation.
  • In general, regardless of the visitation approach employed, a visitation management system according to the present invention includes a monitoring device that permits one or more third parties, such as corrections officers or court officials, to monitor a visitation session between an inmate and a visitor. The term “monitoring,” as used herein, encompasses both live (e.g., real time or near real time) monitoring, for example as by actively listening in on an ongoing visitation session, and recordation of visitation sessions for later review and/or processing. One suitable post-processing system and methodology is disclosed in U.S. provisional application No. 60/901,342, filed Feb. 15, 2007, which is hereby incorporated by reference as though fully set forth herein.
  • In the case of handset and video visitation, the monitoring device may also be capable of playing back audio and/or video as appropriate. In face to face contact visitation settings, the monitoring device could be a microphone, speakerphone, video camera, or the like. Combinations of various monitoring devices (e.g., a microphone and a video recorder) could also be employed. Of course, the monitoring device or devices may be either visible to the parties to the visitation session or hidden from their view.
  • The visitation management system typically includes one or more databases or data stores, which may include one or more of the following types of data and records, discussed in further detail below: demographic information records, visitation schedule records, visitation log records, visitation recording and/or transcript records, configuration information, and operational rules. Of course, the database may also include other types of information and/or records as desired or required by a particular implementation of the visitation management system. The term “database,” as used herein includes relational databases in which a plurality of data sets are associated with each other and stored, preferably as one or more records; the database may be stored in a single medium or may be stored in multiple media interconnected by a network.
  • The demographic information typically includes a variety of data utilized to create records of a plurality of individuals in a variety of role categories. Role categories can include, without limitation, Inmates, Visitors, Employees, Official Visitors, Lawyers, and Clergy. The demographic information will also typically include at least identification information, such as names, addresses, telephone numbers, and the like for the individuals in the database.
  • The demographic data record for an individual may also include or be associated with one or more visitation rules that govern visitation sessions involving that individual. Visitation rules may include, for example, permitted to visit, permitted to be a visitor, blocked from visiting, must record, must not record, must be supervised, must be private, time limits, restrictions on visitation sessions by time and/or day, and the like.
  • The database may also include visitation schedule records, for example a calendar that reflects open and filled visitation “slots.” A scheduled visitation session (e.g., a filled visitation “slot”) can consist of one or more inmates visiting with one or more individuals, and may be a one time event (e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoccurring series of events (e.g., the first of every month from 2:30 PM until 3:00 PM).
  • Scheduling of a visitation session can be initiated by an inmate, by correctional staff, or by the general public (e.g., a prospective visitor from outside the correctional institution). Scheduled visitation sessions may take into account factors such as the inmate's daily schedule, the inmate's allowed visitor list (e.g., by applying visitation rules stored or associated with the inmate's demographic data record), the facility's visitation schedule, and resource availability (e.g., the availability of visitation booths or remote video visitation stations for use by the inmate and/or the visitor). Preferably, scheduled visitation sessions can be altered (e.g., moved to a different date or time) or deleted entirely through a visitation session scheduling interface, which may be either locally or remotely located. In some embodiments, the visitation session scheduling interface may be accessed via a wide area network (WAN), such as the Internet. The present invention may also provide the ability to display or print a summary visitation schedule for any arbitrary time period, such as hourly, daily, weekly, monthly, and the like. As will be described in further detail below, the visitation management system can accommodate both direct entry of scheduled visitation sessions, as well as use in a master/slave configuration where the schedule can be driven by an external system. For example, in some embodiments of the invention, visitation sessions may be scheduled by the public via a publicly-accessible web site or through an automated telephone system connected via the public switched telephone network (PSTN).
  • The visitation management system according to the present invention also preferably stores a history of visitation sessions within the database (referred to herein as “visitation session logs,” “visitation session records,” or “visitation session history”), including information about at least the inmates, visitors, and resources involved in each visitation session. A transcription and/or recording of the visitation session can also be stored or associated with the visitation session log. To facilitate storage and retrieval of the visitation session logs, each visitation session log may be assigned a unique identifier (e.g., a number or alphanumeric sequence).
  • Preferably, the visitation session logs can be queried in a variety of ways and by employing a variety of different search criteria, such as day, inmate, resource, visitor information, or any combination thereof, which makes visitation session log queries a desirable feature of the present invention. For example, different items are often considered contraband in different sections of a correctional facility. Inmates can be very resourceful in getting around facility rules to pass an item from an inmate living in a section where the item is not considered contraband to an inmate living in a section where the item is considered contraband. Upon discovering contraband with the second inmate, a corrections officer could use the visitation session logs to trace the origin of the contraband to the first inmate. For example, a corrections officer could view all visitation session records for a particular visitation resource (e.g., a given visitation booth) and determine which inmates were passing contraband between each other by scheduling visits right after each other (e.g., Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden item hidden in the booth for Inmate B to get during the 4:15 to 4:30 visitation time). A visitation session history report can also be used to determine odd patterns in visitation, such as the same visitor visiting many inmates, or a correlation between specific inmates and visitors and other events in the facilities, such as drug finds, contraband detection, or other misbehavior.
  • Configuration information may also be maintained within the visitation management system and stored within a database. Configuration information includes non-visitation related items, such as the number of phones connected to the visitation management system, where they are located, and a unique name or identifier assigned to each of them. It may also include configuration information about the telephony equipment used, such as board manufacturer, serial numbers, technical data, and the like.
  • Operational rules are still another type of data that may be stored in one or more databases included in a visitation management system according to the present invention. Operational rules typically dictate the conditions under which visitation sessions are permitted to occur. Operational rules are similar to the visitation rules that may be associated with individuals in the demographic database. Operational rules, however, apply across several individuals (e.g., to all individuals in the demographic database or to all individuals in a particular class/role), rather than only to a particular individual. Operational rules can include, but are not limited to, time limits for visitation sessions, visitation count limits, person restrictions, time of day, day of week, authentication required, recording required, monitoring allowed, notifications required, and others. For example, operational rules could exist to limit certain classes of inmates to visitation sessions only once a week for thirty minutes, while other classes of inmates are permitted visitation sessions twice a week for one hour.
  • The visitation management system preferably enforces operational rules and individual visitation rules both during scheduling of visitation sessions, thereby prohibiting the scheduling of visitation sessions in violation of the rules, as well as during visitation sessions. For example, the visitation management system may enforce a time limit operational rule by electronically cutting off the visitation session and/or notifying interested parties, such as staff and corrections officers, after a preset time limit for the visitation session has elapsed or if an unauthorized or impermissible party attempts to join the visitation session.
  • The primary difference between the various installation configurations (e.g., stand alone, OMS-integrated, Inmate Telephone System-integrated) of the visitation management system described above is in the performance of data entry. As described herein, the visitation management system is capable of taking direct input from a human operator, for example in a stand alone installation. Alternatively, the visitation management system can operate in a master/slave arrangement where another system, such as an OMS or an Inmate Telephone System, serves as master, with the visitation management system receiving data therefrom, which may save time and personnel resources that would otherwise be required for data entry to the visitation management system.
  • Thus, one of skill in the art will recognize that the systems and methods disclosed herein can be practiced to good advantage in any combination of visitation approaches and installation configurations without departing from the spirit and scope of the present invention.
  • One advantageous feature of the visitation management system according to the present invention is authentication of the parties to a visitation session. The disclosed visitation management system can authenticate the parties involved in the visitation session according to one or more of a plurality of authentication methods. For example, when using a handset-based approach to visitation (either remote or face to face with a barrier), when the inmate picks up the handset, the inmate may be prompted to enter a telephone ID number or visitation ID number, known only to the inmate. Similarly, when the visitor picks up the handset, the visitor will be prompted to enter in an ID number known only to the visitor. It is only after successful verification of these ID numbers that the visitation session may proceed. The visitation management system, to which the handsets are coupled, will only permit communication between the handsets after valid authentication of both parties to the visitation session. Therefore, communication cannot proceed until authorized. It is also at this point that monitoring of the visitation session can occur.
  • The generation of authentication identifiers for inmates and visitors can be performed in a variety of ways. In some embodiments of the invention, a unique one time identification code is generated for each visitor. This code may be produced by the system just prior to the visitation session taking place, immediately after identity verification of the visitor (e.g., a photo-ID check) has been performed. Typically, the identification code will be valid only for a preset time period (e.g., the identification code will expire after a certain amount of time). The identification code also preferably expires after it is used once for authentication, thereby reducing the likelihood that an authorized visitor can successfully pass an identification code to an unauthorized visitor.
  • Inmate validation can be performed in a similar fashion, or the inmate can use a Telephone ID (TID) number that is shared with the facility's inmate phone system. Inmates generally will not share their TIDs with each other, as it would allow other inmates to make fraudulent charges to the account associated with the TID, making it a suitable identifier to authenticate an inmate to a visitation session.
  • It is also contemplated that authentication may be performed by using biometric devices, such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification. These biometric techniques can be used in place of, or in addition to, the identification number based authentication methodology described above. For example, either or both of the inmate and the visitor may be required to undergo two-factor identification, including input of an identification number and a fingerprint scan.
  • A visitation session typically begins when a corrections officer initiates a visit in the visitation management system. Visitation sessions may also begin automatically when an inmate and visitor both authenticate into a scheduled visitation session. A visitation session will generally continue until it is terminated by a corrections officer, by either of the parties to the visitation system, or by the visitation management system at the expiration of a preset visitation session time limit, which may be established according to one or more operational rules. The visitation session may also be terminated if the visitation management system detects a violation of an operational or individual visitation rule during the course of the visitation session. The system may also provide visual or auditory feedback to a corrections officer when a visitation session has expired or otherwise been terminated. The visitation management system will disconnect all audio or audio/video connections at the expiration of a visitation session.
  • The visitation management system may permit corrections staff at a facility to view and/or listen to visitation sessions currently in progress from a computer terminal or other suitable device. Preferably, a corrections officer can select one or more ongoing visitation sessions to monitor, and may be provided with a real time or near real time audio and/or video feed of each monitored visitation session, depending on the type of visitation session. Of course, if a visitation session is being conducted with an Official Visitor (e.g., an individual subject to a “do not monitor” operational or individual visitation rule, such as the inmate's lawyer), the corrections officer would not be able to monitor the conversation.
  • In addition to monitoring a visitation session in progress, the corrections officer may also participate in the visitation session by talking to one or both parties thereto. The corrections officer may also be able to terminate the visitation session at any time through the visitation management system, either with or without warning to the parties to the visitation session, for example upon detecting that a rules violation has occurred during the visitation session.
  • The visitation management system may also be configured to permit the corrections officer to transfer a live audio and/or video feed of the visit to any phone, computer terminal, video screen, or the like, be it inside the facility or outside the facility, for monitoring of the visitation session by one or more additional parties. For example, the visitation management system may be configured to transfer monitoring to cell phones of investigators, district attorneys, or others. Typically, the transfer of the monitoring would be undetectable by either the inmate or the visitor. Preferably, the transferee party will have the same ability as the corrections officer to join in or terminate the visitation session.
  • During a visitation session, the audio and/or video of the visit may be recorded, if desired (and permitted by the rules). The recorded data may be encoded into a computer-readable format, and may be stored either on a file system or within a database. As described above, the visitation session record for each visitation session may be assigned a unique identifier that may be used to correlate the participants in the visitation session, the date and time of the visitation session, the location of the visitation session, what corrections officers verified the identities of the participants to the visitation session, and other relevant details.
  • As described above, the recording of the visitation session and the data associated with the visitation session record can later be searched for and retrieved from within the visitation management system. Searching for visitation sessions can be completed based on one or more of a plurality of criteria including, without limitation, date and/or time of the visitation session, inmate name, inmate ID, visitor name, visitor ID, visitation booth, visitation area, and any combination thereof. Further, the recording of the visitation session can preferably be played back at any time and from any location that has access to a computer or phone system that can connect to the visitation management system. The corrections officer may be provided the ability during playback of the visitation session to annotate notes and transcriptions, which may be stored or associated with the visitation session record.
  • It is also contemplated that any recording of the visitation session can be downloaded to removable media, such as a CD or DVD, for playback on many standard devices. For example, in the case of a handset based approach to visitation, the audio file of a recorded visitation session can be written to a CD for playback in any standard CD player. This would permit, for example, the visitation session to be played back in court if necessary. Additionally, recordings of visitation sessions can be stored on removable media in binary format, advantageously allowing recordings of many visitation sessions to be stored on one disk for playback in a computer. Binary recordings also advantageously provide the ability to protect the recording with a security wrapper and/or watermarking process to alleviate tampering concerns.
  • In some embodiments of the invention, the audio of the visitation session can also be transcribed into text by a manual, human-driven process, by real time or near real time audio transcription software, or in a batch software process that can transcribe the audio after the visitation session has concluded.
  • The transcript of the visitation session can then advantageously be indexed and searched along with other database records. Typically, like the recording of a visitation session, the transcript of the visitation session will be stored or associated with the visitation session history, and can be accessed and printed from within the visitation management system. In some embodiments of the invention, rules can be configured in the visitation management system to flag certain keywords, phrases, or topics of conversations. These rules can be used to notify interested parties when a transcript meeting the rules is stored in the visitation management system (e.g., a rule that notifies a corrections officer whenever the terms “gang” and “cocaine” are both uttered in a visitation session).
  • FIG. 1 depicts a block diagram of a visitation management system 100 according to an embodiment of the invention, including the communications connections between the components thereof. The visitation control unit 102, which is depicted in further detail in FIG. 2, is connected to each of the other components of the visitation management system. The visitation control unit may communicate via a local area network (LAN) 104 for local resources, such as data storage 106 (shown in further detail in FIG. 4), control stations 108, video communication devices 110, and audio communication devices 112. The LAN may, but need not be, exclusively Ethernet technology, and thus may employ any type of communication medium and protocol, including analog, voltage based transmission.
  • Communication to remote visitation and audio devices is typically accomplished via the use of a LAN, commonly Ethernet or T1 digital framing, though other techniques are regarded as within the spirit and scope of the present invention. The wide area network (WAN) 114 provides a dedicated, private link between the visitation control unit and remote devices.
  • The Internet 116 can be utilized to provide access to remotely distributed control stations, scheduling clients 118, and home visitation devices 120. The speed requirement of the Internet link is dependent on the number of simultaneous connections supported.
  • Referring now to FIG. 2, the visitation control unit is the central processing center for the visitation management system 100. In some embodiments of the invention, the processing power for the visitation control unit comes from standard personal computer (PC) components, configured in a more robust and redundant server role. This generally means higher quality components, with redundant power supplies, hard drives, and other components, but a standard, off-the-shelf (e.g., consumer-grade) system could also be utilized.
  • The visitation management system is designed to work with a variety of hardware, such as Intel or AMD based processors, and Operating Systems, such as Microsoft Windows, Linux, Mac OS, and the like. The visitation management system itself is independent of the operating system in which it is operating. Each server depicted in FIG. 2 can be construed as either a physical hardware device or a virtual server. The number of physical hardware machines can be scaled to match the number of simultaneous user connections desired in the visitation management system. Additionally, if space and/or power consumption are considerations, the visitation management system can be scaled down to reduce these concerns.
  • The servers that collectively make up the visitation control unit are typically each connected to a central network bus 210, which will most commonly be an Ethernet connection. In addition, the entire visitation management system may be shielded from the rest of the network at an institution by a router or firewall, which can, of course, be either hardware or software based.
  • The video server 212, of which there may be one or more, connects to each of the video visitation devices and performs the necessary electrical connections and switching required to connect two or more visitation station units together for a visitation session. The video server can also send the audio and/or video feed to any other computer or device coupled to the visitation control unit for monitoring, recording, or other purposes. Additionally, in some embodiments of the invention, the video server is capable of performing real time translation of video protocols to allow for different video visitation hardware to be utilized in different locations. One of ordinary skill in the art will recognize how the video server establishes a video conference between parties to a visitation session, including, in some instances, a monitoring party.
  • The audio server 214, of which there may be one or several, is the audio analogue to the video server. The audio server connects audio devices, such as standard telephones, together and can send the output to any additional devices connected to the visitation control unit for monitoring, recording, or other reasons. The phone devices can be connected to the server via two wire copper connections, via twisted pair digital connections, wireless/cordless connections, or other techniques that will be familiar to one of ordinary skill. Preferably, the audio server has the capability to detect and respond to DTMF based events, flash hook events, and any other event that can be generated by a telephone device. The audio server may also be able to ring the telephone devices. The audio server may also be connected to outside telephone lines to route audio to an outside source, such as a land line or cellular phone.
  • The web server 216 is typically a standard device, which may run Apache, Microsoft Internet Information Server, or other web server software. The primary function of the web server is to route requests and other communications from visitation control stations, remote visitation scheduling clients, and home visitation devices into the appropriate destination within the visitation control unit. The web server can also serve as a maintenance point into the visitation control unit for servicing and configuring the system. Typically, the web server will be connected to both the public Internet and the internal network of an organization (e.g., a private intranet).
  • The application server 218 functions as the primary center of logic processing in the visitation management system. A block diagram of the application server is shown in FIG. 3. The application server may be a common PC based machine with one or more CPU's 310 connected via a bus 314 to other peripherals including, without limitation, a network card 316, analog modem 318, keyboard 320, mouse (not shown), and a monitor 322. Additionally, both system memory 322, consisting of RAM, and other data storage 324, e.g., magnetic, optical, or flash memory may be connected to the bus.
  • System memory 322 contains the runtime environment of the application server. While the preferred embodiment of the device contains an operating system 330 (e.g., Windows, Linux, or another operating system), and a Java virtual machine 332, the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.
  • Internal non-volatile storage 324, preferably, but not necessarily, a hard drive, is used to store the operating system, application files, temporary files used during the operation of the system, and as a temporary storage space for recordings of visitation sessions. It is contemplated that recordings of visitation sessions will periodically be moved to another location, for example by an automated scheduled file transfer process, though recordings of visitation sessions may also be stored on the application server without departing from the spirit and scope of the present invention.
  • As shown in FIG. 4, in addition to the storage on the application server, there may also be one or more databases and associated Network Attached Storage (NAS) devices connected to the application server via the network. Although, as noted above, the term “database” is typically used herein to refer to a relational database, the term is also intended to encompass a relational database application or a remotely defined data store.
  • The remotely defined data store can be an external system, such as an Inmate Telephone System, an Offender Management System, or other information system application. In some embodiments of the invention, the data store is not a formal data store at all, but rather is a real time link to live data. In still other embodiments of the visitation management system, a variety of such data stores and databases are simultaneously employed in a heterogeneous environment.
  • As described above, the database will typically provide access to a variety of different types of data records. For example, data related to an inmate, including name, commitment information, address, and the like may be linked to the majority of the remaining data types. Such identification records may be entered directly into the visitation management system or, alternatively, loaded from an external system such as an OMS or Inmate Telephone System.
  • Scheduling data is typically generated only within the visitation management system and consists of visitation events that have not yet occurred (e.g., visitation schedule records) as well as historical visit information (e.g., visitation session records). A visitation schedule record may include links to all involved parties, including inmates, visitors, and correctional staff (if correctional staff are needed). It may also include links to other resources that will be used in the visitation session, such as inmate visitation booths, telephone reservations, data bandwidth guarantee reservations, as well as other metadata about the visitation session.
  • A separate logical data store can be used to store visitation session records, which may include a link to the original visitation session reservation (e.g., the visitation schedule record), any recordings or transcripts of the visitation session, and a list of the actual resources used, if they differed from the resources originally reserved for the visitation session. The data is preferably stored in such a way as to facilitate long term storage and easy data reporting capabilities.
  • A fourth type of database or data store may include configuration information for the visitation management system itself. As described above, this information may include the connection details of all the various hardware devices connected, such as the video and audio servers, web servers, application servers, and remote devices. The configuration data allows the system to be configured with a variety of different hardware types and manufacturers, enabling the application to run under a variety of different configurations depending on the needs and requirements of a given installation of the visitation management system.
  • Additionally, a fifth data store is the Network Attached Storage (NAS) device that may be used to store the actual audio and/or video recordings of visitation sessions. While the NAS may be configured as a relational database, it is preferably configured as a mass storage device, and a pointer or other reference to the location of data stored on the NAS may be stored as part of a record in another database. The NAS is preferably a very large storage device that can be expanded as the need arises to accommodate more live (e.g., on-line) storage of visitation session data. Various settings can be configured as to the lifespan of the data contained within the NAS. An infinite lifespan of data will, of course, require an infinite amount of storage, so such controls are necessary to limit or reduce the size of the NAS required. The capability could also be provided to export visitation session data off the live storage mechanism into permanent off-line storage, such as optical media for archival purposes or for presenting as evidence in court or aiding in the investigation of criminal activity.
  • Typically, standard analog inmate telephones are preferably used for audio communication during face to face and remote visitation sessions. They could also be used for video visitation sessions if the selected video communication device does not provide audio services. Unlike most existing visitation systems, the phones in the visitation management system according to the present invention are coupled to the audio server (e.g., the visitation control unit) rather than being directly connected to each other in pairs. In the case of standard analog phones, they will typically be connected to the server via a 66 block or other interface block. The phones, since they are not connected directly together, require the audio server to provide line power and logical switching services. In addition, because of the nature of this connection, the phones can easily be changed in real time to be connected to other devices. This advantageously increases the flexibility of the visitation management system, permitting such configurations as a many-to-many connection between telephones, while also providing a convenient controller (e.g., the visitation control unit).
  • Further, it is contemplated that “smart” phones may be used instead of, or in addition to, analog phones, similarly connected over a network to the audio server. The addition of smart phones could facilitate implementation of additional features in the visitation management system, such as authentication of parties to a visitation session as described above (e.g., via biometric identification devices or card readers), payment services (e.g., via credit card readers for ‘for-pay’ visitations), or deposits into an inmate accounting system. Smart phones could also introduce additional interactive services, such as display readouts for elapsed and remaining times, or other information.
  • In the case of a typical installation of visitation booths, a pair of phones would be installed in a visitation booth, one on each side of the divider between the inmate and the visitor. Unlike prior art systems, the phones used in the visitation management system of the present invention preferably are not connected for communication until the controlling hardware (e.g., the visitation control unit) and the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface. This allows for precise timing of visits, authentication, and the ability to interrupt the visit by a third party.
  • Video visitation devices may be connected in a similar manner as phone devices-that is, via a central video server incorporated into the visitation control unit, rather than directly together. One of ordinary skill in the art will recognize that the video devices function similarly to the audio devices. Of course, video conferencing stations can be located in the same building connected via a LAN, coupled across a relatively short distance (e.g., within the same town) via a WAN, or coupled across a much larger distance (e.g., across several states) via an extended WAN. Preferably, the video conferencing devices have the capability to split audio signals from video signals to transmit the two signals to two different devices. This capability is may be used, for example, when connecting from a dedicated video conference station that supports both audio and video to a remote web-cam for video transmission via the Internet and a standard telephone for audio transmission via telephone lines.
  • Connected to the application server is a theoretically unlimited number of local client computers. The computers are running a local web browser, such as Microsoft's Internet Explorer, or Mozilla's Firefox. The browsers interpret user interactions and inputs and transmit these interactions and inputs to the application servers, where the interactions and inputs are used to control the audio and video servers. Clients are also able to administer the system, such as setting up resources and viewing, inserting, and deleting inmates or visitation sessions.
  • Preferably, the web application also provides mechanisms to view the current state of the system. The “current state of the system” is all active visitation sessions happening within the visitation management system. The amount of data visible to the user may be limited by the user's role. For example, some corrections officers may be able to see only that an inmate is in a visitation session, while other corrections officers could see where the visit is occurring and what type of visitation session it is (e.g., telephonic, remote video, in person). Still other classes of users may be able to listen in on and/or view the visitation session, as well as terminate or extend the visitation session.
  • As described above, the visitation management system may be part of a larger application, such as an Offender Management System or Inmate Telephone System, or it may be a standalone application depending on client configuration and modules installed. While the visitation management system is, in some embodiments, a web-based system, it is also contemplated that the functionality of the system can be delivered via a variety of application platforms, including, but not limited to, client/server or rich client.
  • Optionally, a facility may provide access to the visitation management system via the Internet or other communication network. In this case, remote clients, typically also running web browsers such as Microsoft's Internet Explorer or Mozilla Firefox, will be able to access the visitation management system as though locally connected to the visitation management system. One potential user of a remote client might be an investigator, not located at the correctional facility, who is interested in all visitation sessions involving a particular inmate. This investigator could be notified automatically by the visitation management system when a visitation session is occurring, and the investigator can log on to the visitation management system from any Internet-connected remote location and device to view and/or listen to the visitation session in progress.
  • This remote accessibility provides an advantage over the prior art, where an investigator ordinarily must rely on an alert correctional officer to take note of a visitation session of interest occurring and then notify the investigator of the date, time, booth, inmate, visitor, etc. that was involved in the visitation session. Thereafter, in order to listen to the content of the visitation session, the investigator would be required to search for the recording or transcript—if any—of the visitation session after the fact based on the reported date, time, and location of the visitation session. This method is time consuming, imprecise, error prone, and reactive. On the other hand, the inventive method disclosed herein is fast, accurate, precise, and proactive, which is a considerable improvement over the prior art.
  • A special type of limited client access can also be provided to the general public in order to schedule and conduct visitation sessions via a home personal computer. In some embodiments of the invention, the visitor uses a web camera connected to the visitor's home PC, which is connected to the Internet. The individual logs on to the visitation management system via the world wide web to request and schedule visitation sessions, as well as to actually participate in a visitation session. Audio visitation sessions would work in a fashion similar to an inmate telephone call, though the visit is at a predetermined time and is mutually initiated. A video visitation session will use the web camera to transmit video, and the monitor will display video. Audio can be transmitted via a standard phone line or via computer speakers and microphone. These types of visitation sessions will also be able to be monitored, transcribed, and/or controlled from any other client connected to the visitation management system. The maximum number of simultaneous remote visitation sessions is controlled by available bandwidth coming from the facility, as well as the physical number of video or audio devices that exist. As an alternative to visitors utilizing their home PCs to connect to the visitation management system over the Internet, special dedicated terminals may be provided outside the correctional facility, but still within the correctional enterprise's network, to perform the same or similar functions.
  • A significant advantage of the visitation management system is its ability to integrate with a variety of other solutions for the corrections market. Services can be provided to integrate directly at the database level, where inmates and other data can be moved seamlessly from one system to another (e.g., between an OMS and the visitation management system). Services can also exist to integrate at a higher level, such as the visitation management system sending messages on events occurring to external systems. For example, a visitation session involving a particular inmate may trigger a message to an outside system, such as an investigator, District Attorney, or court system. Integration may also exist to connect visitation management systems at several correctional facilities to allow for facility to facility visitation sessions.
  • FIGS. 5 and 6 are flowcharts of a visitation process using the visitation management system. Scheduling of a visitation session is initiated by either an inmate or by the visitor. The visitation session can be scheduled far in advance, and is made according to the operational rules of the correctional facility. For example, a correctional facility may require that an inmate only has three visitation sessions per month or that only approved visitors may participate in visitation sessions. Regardless of how the visit schedule is created (e.g., whether initiate by the inmate or initiated by the visitor), the operational rules are preferably enforced by the visitation management system to ensure that only compliant visitation sessions are scheduled.
  • If desired by the correctional facility, a visitor may initiate the scheduling process. Often times, a visitor must be approved before a visitation session can be scheduled. A visitor can place himself or herself on a waiting list to be approved by the facility if the visitor is not already on the list. Individual combinations of visitors and inmates may be approved. Alternatively, certain visitors may be approved to visit any inmate.
  • Once a visitor has an inmate on the visitor's approved inmate list, the visitor can schedule a visitation session by browsing for available days and times. Available visitation sessions may be presented by taking into account the facility's visiting hours, the inmate's schedule, and other facility rules as reflected in the visitation schedule records. An option could also exist to auto-pick the first available time for a visitation session.
  • Once a visitation session is scheduled, a record of the visitation session is created in the appropriate database or data store detailing at least the participants in the visit (e.g., the name of the inmate and the name, address, and phone number of the visitor), and, in some embodiments of the invention, the resources that will be required to participate in the visit, such as visitation booths, video devices, or room reservations. The visitor is notified of the confirmed visitation session date and time and may be given a confirmation code that uniquely identifies the scheduled visitation session. Preferably, once created, the scheduled visitation session can be modified by the inmate, the visitor, or an administrative individual. Modifications can include changes in date and/or time, resource changes, or a complete cancellation of the visitation session. Upon any change to the reservation, the visitor must be notified of the change. This can be done via email, postal mail, or via telephone. Likewise, the record of the visitation session may also be updated.
  • Once the time arrives for the visitation session, both the inmate and the visitor must be located in the proper place for the visit. Often, the individuals involved in the visitation session, both inmate and visitor, must be positively identified by a corrections officer as well as authenticated to the visitation session as described herein. Generally, it is easy to positively identify an inmate, as inmates are required to have identification on them at all times. The inmate can further be positively identified by requiring a unique telephone or visitation session identification code to be entered into a phone or video device before the visitation session can proceed. Identifying individuals of the general public can be more problematic, but facility rules can be set up to require a state or federally issued identification card to be shown before the visitation session can commence. To further identify the individual, a unique one-time code can be generated that will only allow the visitor to participate in the visitation session the visitor was scheduled for. This helps prevent a common scenario where visitors try to circumvent facility rules to visit someone they are not permitted to visit. Additionally, identification and authentication can also be performed via biometric devices, such as fingerprint readers.
  • Once both parties to the visitation session have been positively identified by the system, the visitation session can be said to have started. At this point, the visitation management system will initiate a timer to calculate the elapsed and remaining time of the visitation session.
  • During the duration of the visitation session, any individual with the proper rights and privileges can view visitation sessions in progress, listen in on them, or speak to one or both parties to the visitation session. Appropriately credentialed users may also be able to terminate the visitation session or grant additional time to the parties. The visitation session may also be recorded so that individuals can review a recording and/or transcript of the visitation session at a later time.
  • Towards the end of the visitation session, participants may be notified of the time remaining in the visitation session. A prompt, such as “You have 3 minutes remaining for this visit” can be played over a telephone or other audio device or overlaid on the screen for a video visit.
  • At the conclusion of the visitation session, the visitation management system automatically terminates the logical device connections (e.g., the connection between telephone or video devices) to ensure that no further communication can take place between the inmate and the visitor. The visitation management system then creates a record of the completed visitation session as described herein. Of course, if desired, the system can start a transcription process to convert any recorded audio into searchable text.
  • The inmate is escorted back to his or her cell, and the visitor can leave the facility at this point. The visitation booths are now available for use for other visitation sessions.
  • After the visit has concluded, the visitation session record becomes available for retrieval at a later point by corrections officers, police officers, investigators, and others who may require access.
  • The visitation management system according to the present invention advantageously allows for searching of past visitation sessions via such criteria as inmate name, visitor name, visitation session locations, dates and times, content of the visitation sessions (e.g., topics discussed), and unique visit IDs. Once the visitation management system is provided with the proper search input parameters from a user, the application server queries the database for results matching the user's request. The results will be formatted and presented back to the user, typically via the web browser. The user can then export the details of one or more of the output visitation sessions, or the audio and/or video of the visitation session, if available, to external media, such as CD or DVD. The media can be presented in court, if needed, to serve as evidence.
  • Although several embodiments of this invention have been described above with a certain degree of particularity, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of this invention. For example, though the present invention has been generally been described in the context of a one-to-one visitation session, one of ordinary skill in the art will appreciate that the principles disclosed herein may also be applied to a one-to-many, many-to-one, or many-to-many visitation session. As such, the term “party,” as used herein, should not be construed to refer to only a single individual, but rather is intended to encompass one “side” of a visitation session (e.g., in a visitation session between an inmate and the inmate's family, the inmate is a party and the family is a party).
  • It is intended that all matter contained in the above description or shown in the accompanying drawings shall be interpreted as illustrative only and not limiting. Changes in detail or structure may be made without departing from the spirit of the invention as defined in the appended claims.

Claims (34)

1. A method of managing visitation in a controlled-access environment, the method comprising:
accessing a visitation control system, the visitation control system comprising:
a visitation session scheduling interface;
a plurality of communications devices;
a switching interface; and
at least one authentication interface;
defining a set of rules governing visitation in the controlled-access environment;
requesting a visitation session using the visitation session scheduling interface of the visitation control system;
assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment;
scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment;
using the at least one authentication interface to authenticate a first party to the visitation session;
using the at least one authentication interface to authenticate a second party to the visitation session;
establishing communication between the first party to the visitation session and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and
storing a record of the visitation session in a visitation session database, the record of the visitation including at least information regarding identities of the first party and the second party.
2. The method according to claim 1, wherein the step of defining a set of rules governing visitation in the controlled-access environment comprises defining one or more operational rules.
3. The method according to claim 1, further comprising storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system.
4. The method according to claim 3, wherein the step of defining a set of rules governing visitation in the controlled-access environment comprises defining one or more visitation rules, each of the one or more visitation rules being associated with a single user of the visitation control system.
5. The method according to claim 4, further comprising associating each of the one or more visitation rules with a demographic information record.
6. The method according to claim 1, wherein the step of establishing communication between the first party to the visitation session and the second party to the visitation session comprises establishing at least an audio connection between the first party and the second party through the visitation control system.
7. The method according to claim 6, wherein the step of establishing at least an audio connection between the first party and the second party through the visitation control system comprises connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface.
8. The method according to claim 6, wherein the step of establishing at least an audio connection between the first party and the second party through the visitation control system comprises establishing both an audio connection and a video connection between the first party and the second party through the visitation control system.
9. The method according to claim 1, further comprising terminating the communication between the first party and the second party at the conclusion of a preset period of time.
10. The method according to claim 1, further comprising:
determining whether the visitation session is to be monitored; and
monitoring the visitation session in response to a determination that the visitation session is to be monitored.
11. The method according to claim 10, further comprising defining a plurality of visitation session monitoring criteria, wherein the step of determining whether the visitation session is to be monitored comprises assessing whether the visitation session meets at least one visitation session monitoring criterion.
12. The method according to claim 10, further comprising, during the step of monitoring the visitation session:
detecting a violation of one or more rules governing visitation in the controlled-access environment; and
terminating the communication between the first party and the second party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
13. The method according to claim 10, further comprising, during the step of monitoring the visitation session:
detecting a violation of one or more rules governing visitation in the controlled-access environment; and
notifying a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
14. The method according to claim 1, further comprising assigning an identification code to at least one of the first party and the second party, wherein at least one of the steps of using the at least one authentication interface to authenticate a first party to the visitation session and using the at least one authentication interface to authenticate a second party to the visitation session comprises using the identification code respectively assigned thereto to authenticate the respective party to the visitation system.
15. The method according to claim 1, further comprising:
receiving a biometric input measurement from at least one of the first party and the second party; and
associating the received biometric input measurement with the respective party,
wherein at least one of the steps of using the at least one authentication interface to authenticate a first party to the visitation session and using the at least one authentication interface to authenticate a second party to the visitation session comprises using the biometric input measurement to identify the respective party to the visitation system.
16. The method according to claim 15, wherein the biometric input measurement is a fingerprint.
17. The method according to claim 15, wherein the biometric input measurement is a voice print.
18. The method according to claim 1, wherein the step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment comprises verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.
19. A system for managing visitation in a controlled-access environment, the system comprising:
a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including:
at least one software program controlling the switching interface;
at least one software program to schedule a visitation session; and
at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment;
a first communications device coupled to the visitation controller;
a second communications device coupled to the visitation controller;
a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session;
a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session;
at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and
a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session.
20. The system according to claim 19, wherein the visitation controller establishes at least audio communication between the first communications device and the second communications device through the switching interface.
21. The system according to claim 20, wherein the visitation controller establishes both audio communication and video communication between the first communications device and the second communications device through the switching interface.
22. The system according to claim 19, wherein at least one of the first authentication interface and the second authentication interface comprises a biometric interface.
23. The system according to claim 22, wherein the biometric interface comprises a fingerprint identification interface.
24. The system according to claim 22, wherein the biometric interface comprises a voice print identification interface.
25. The system according to claim 19, wherein at least one of the first authentication interface and the second authentication interface comprises an identification code input interface.
26. The system according to claim 19, wherein the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.
27. The system according to claim 19, wherein the at least one monitoring devices enables at least near real-time monitoring of the visitation session.
28. The system according claim 19, wherein the at least one monitoring device comprises a recording device to record the visitation session.
29. The system according to claim 19, wherein both the first communications device and the second communications device are internal to the controlled-access environment.
30. The system according to claim 19, wherein one of the first communications device and the second communications device is external to the controlled-access environment.
31. The system according to claim 30, wherein the one of the first communications device and the second communications device external to the controlled-access environment is coupled to the visitation controller via the Internet.
32. The system according to claim 19, further comprising at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session.
33. The system according to claim 32, wherein the at least one visitation scheduling client is external to the controlled-access environment.
34. The system according to claim 33, wherein the at least one visitation scheduling client communicates with the visitation controller via the Internet.
US11/819,834 2007-02-15 2007-06-29 System and method for visitation management in a controlled-access environment Abandoned US20080201158A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/819,834 US20080201158A1 (en) 2007-02-15 2007-06-29 System and method for visitation management in a controlled-access environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US90134207P 2007-02-15 2007-02-15
US11/819,834 US20080201158A1 (en) 2007-02-15 2007-06-29 System and method for visitation management in a controlled-access environment

Publications (1)

Publication Number Publication Date
US20080201158A1 true US20080201158A1 (en) 2008-08-21

Family

ID=39707413

Family Applications (7)

Application Number Title Priority Date Filing Date
US11/819,834 Abandoned US20080201158A1 (en) 2007-02-15 2007-06-29 System and method for visitation management in a controlled-access environment
US12/032,200 Active 2030-07-04 US8731934B2 (en) 2007-02-15 2008-02-15 System and method for multi-modal audio mining of telephone conversations
US14/281,323 Active 2028-10-06 US9552417B2 (en) 2007-02-15 2014-05-19 System and method for multi-modal audio mining of telephone conversations
US15/412,992 Active US10120919B2 (en) 2007-02-15 2017-01-23 System and method for multi-modal audio mining of telephone conversations
US15/974,314 Active 2028-04-06 US10853384B2 (en) 2007-02-15 2018-05-08 System and method for multi-modal audio mining of telephone conversations
US17/107,304 Active 2028-05-19 US11789966B2 (en) 2007-02-15 2020-11-30 System and method for multi-modal audio mining of telephone conversations
US18/240,150 Pending US20240054142A1 (en) 2007-02-15 2023-08-30 System and method for multi-modal audio mining of telephone conversations

Family Applications After (6)

Application Number Title Priority Date Filing Date
US12/032,200 Active 2030-07-04 US8731934B2 (en) 2007-02-15 2008-02-15 System and method for multi-modal audio mining of telephone conversations
US14/281,323 Active 2028-10-06 US9552417B2 (en) 2007-02-15 2014-05-19 System and method for multi-modal audio mining of telephone conversations
US15/412,992 Active US10120919B2 (en) 2007-02-15 2017-01-23 System and method for multi-modal audio mining of telephone conversations
US15/974,314 Active 2028-04-06 US10853384B2 (en) 2007-02-15 2018-05-08 System and method for multi-modal audio mining of telephone conversations
US17/107,304 Active 2028-05-19 US11789966B2 (en) 2007-02-15 2020-11-30 System and method for multi-modal audio mining of telephone conversations
US18/240,150 Pending US20240054142A1 (en) 2007-02-15 2023-08-30 System and method for multi-modal audio mining of telephone conversations

Country Status (1)

Country Link
US (7) US20080201158A1 (en)

Cited By (62)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090233543A1 (en) * 2008-03-11 2009-09-17 Disney Enterprises, Inc. System and method for providing a rich media visitor log
US20100128104A1 (en) * 2008-11-24 2010-05-27 Innovatec Sl Communication System for Remote Patient Visits and Clinical Status Monitoring
US20100287251A1 (en) * 2009-05-06 2010-11-11 Futurewei Technologies, Inc. System and Method for IMS Based Collaborative Services Enabling Multimedia Application Sharing
US20110047473A1 (en) * 2009-08-19 2011-02-24 Core System (NI) Limited Inmate information center for correctional facility processing
US20110096139A1 (en) * 2009-10-22 2011-04-28 James Rudolf System and Method for Providing Secure Video Visitation
US20130002804A1 (en) * 2005-10-31 2013-01-03 At&T Corp. Method and apparatus for providing high security video session
US8542802B2 (en) 2007-02-15 2013-09-24 Global Tel*Link Corporation System and method for three-way call detection
US20130262521A1 (en) * 2012-03-30 2013-10-03 Atul Gupta Mechanism for Multiple System Common Scheduling and Analysis of Unrelated Events in a Corrections Facility
US8630726B2 (en) 2009-02-12 2014-01-14 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US8648894B2 (en) 2011-05-04 2014-02-11 Eyconix, Llc Virtual inmate visitation
US8731934B2 (en) 2007-02-15 2014-05-20 Dsi-Iti, Llc System and method for multi-modal audio mining of telephone conversations
US20140218466A1 (en) * 2012-12-21 2014-08-07 Tw Vending, Inc. Audio-video remote visitation telecommunications technology
US9007420B1 (en) * 2014-01-10 2015-04-14 Securus Technologies, Inc. Verifying presence of authorized persons during an electronic visitation
US9077680B2 (en) 2005-02-17 2015-07-07 Core Systems (Ni) Limited Offender message delivery system
US9094569B1 (en) * 2012-02-01 2015-07-28 Gary James Humphries Remote web-based visitation system for prisons
US9106789B1 (en) * 2012-01-20 2015-08-11 Tech Friends, Inc. Videoconference and video visitation security
US20150340983A1 (en) * 2010-01-08 2015-11-26 Tigo Energy, Inc. Systems and methods for an identification protocol between a local controller of a solar module and a master controller
US9225935B2 (en) 2013-03-15 2015-12-29 Intelmate Llc Video communications in detention environments
US9225838B2 (en) 2009-02-12 2015-12-29 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US9380082B1 (en) * 2013-10-22 2016-06-28 Securus Technologies, Inc. Remote multi-party and/or event-driven visitation for residents of controlled-environment facilities
CN105933868A (en) * 2016-06-27 2016-09-07 合肥指南针电子科技有限责任公司 Prison break prevention system for supervision
US9558523B1 (en) * 2016-03-23 2017-01-31 Global Tel* Link Corp. Secure nonscheduled video visitation system
US9584252B1 (en) 2015-09-25 2017-02-28 Harris Corporation Managed access system with mobile wireless device geolocation capability
US9667763B1 (en) * 2013-05-20 2017-05-30 Securus Technologies, Inc. Family communications in a controlled-environment facility
US9681360B1 (en) * 2016-05-13 2017-06-13 Harris Corporation Managed access system that provides selective communications and registration of mobile wireless devices
US9723040B1 (en) * 2015-09-02 2017-08-01 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US9736706B2 (en) 2015-09-25 2017-08-15 Harris Corporation Managed access system with monitoring device to determine system operability
US9763095B2 (en) 2015-09-25 2017-09-12 Harris Corporation Managed access system that determines authorized and unauthorized mobile wireless devices
US9769666B2 (en) 2015-09-25 2017-09-19 Harris Corporation Managed access system with monitoring device to determine and change radio equipment
US9800830B2 (en) 2012-02-01 2017-10-24 Homewav, Llc Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party
US9820150B2 (en) 2015-09-25 2017-11-14 Harris Corporation Managed access system having filtered communications using network interface device
US9923936B2 (en) 2016-04-07 2018-03-20 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US9924135B1 (en) * 2013-02-11 2018-03-20 Securus Technologies, Inc. Rules-based systems and methods for video visitation
US9930088B1 (en) 2017-06-22 2018-03-27 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call
US9930042B2 (en) 2016-03-15 2018-03-27 Global Tel*Link Corporation Controlled environment secure media streaming system
US9973810B2 (en) 2016-05-06 2018-05-15 Global Tel*Link Corp. Controlled environment media and communication system
US10015546B1 (en) 2017-07-27 2018-07-03 Global Tel*Link Corp. System and method for audio visual content creation and publishing within a controlled environment
US10027797B1 (en) 2017-05-10 2018-07-17 Global Tel*Link Corporation Alarm control for inmate call monitoring
US10122825B1 (en) 2017-07-27 2018-11-06 Global Tel*Link Corporation Systems and methods for providing a visual content gallery within a controlled environment
US10171680B1 (en) * 2017-06-30 2019-01-01 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US10225396B2 (en) 2017-05-18 2019-03-05 Global Tel*Link Corporation Third party monitoring of a activity within a monitoring platform
US10284559B2 (en) 2016-05-13 2019-05-07 Harris Corporation Managed access system with security assessment equipment
US10296784B2 (en) 2014-01-10 2019-05-21 Securus Technologies, Inc. Verifying presence of a person during an electronic visitation
US10296994B2 (en) * 2016-02-11 2019-05-21 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US10321094B2 (en) 2016-01-20 2019-06-11 Global Tel*Link Corporation Secure video visitation system
US10405184B2 (en) 2017-01-31 2019-09-03 Harris Corporation Mobile wireless device managed access system providing enhanced authentication features and related methods
US10405007B2 (en) 2017-07-27 2019-09-03 Global Tel*Link Corporation Systems and methods for a video sharing service within controlled environments
US10565247B2 (en) 2017-07-28 2020-02-18 Global Tel*Link Corporation Controlled environment secure media streaming system with digital video recording
US10572961B2 (en) 2016-03-15 2020-02-25 Global Tel*Link Corporation Detection and prevention of inmate to inmate message relay
US10609089B1 (en) * 2017-12-20 2020-03-31 Securus Technologies, Inc. Influencing the location of contraband wireless communications devices within controlled-environment facilities
US10699810B2 (en) * 2017-07-20 2020-06-30 Kenneth W. STEWART Employee visit verification system
US10713743B1 (en) 2013-11-01 2020-07-14 Securus Technologies, Inc. Management of visitation sessions for residents of controlled-environment facilities
US10740861B1 (en) * 2003-11-24 2020-08-11 Securus Technologies, Inc. Systems and methods for acquiring, accessing, and analyzing investigative information
US10860786B2 (en) 2017-06-01 2020-12-08 Global Tel*Link Corporation System and method for analyzing and investigating communication data from a controlled environment
US10896622B2 (en) 2017-06-20 2021-01-19 Global Tel*Link Corporation Educational content delivery system for controlled environments
US10929940B1 (en) * 2018-03-02 2021-02-23 Securus Technologies, Llc Controlled-environment facility message response system
US10929941B1 (en) * 2019-03-21 2021-02-23 Securus Technologies, Llc Controlled incarceration risk mitigation mechanisms for at risk constituents employing controlled-environment facility communications systems
US11164151B2 (en) 2017-07-20 2021-11-02 Global Tel*Link Corporation System and method for providing job-specific training and employment to residents of a controlled environment facility
US11213754B2 (en) 2017-08-10 2022-01-04 Global Tel*Link Corporation Video game center for a controlled environment facility
US20220272131A1 (en) * 2020-09-04 2022-08-25 Puzzle Ai Co., Ltd. Method, electronic device and system for generating record of telemedicine service
US11611721B2 (en) 2016-10-27 2023-03-21 Chris Talbot Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility
US11757958B1 (en) 2015-09-02 2023-09-12 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates

Families Citing this family (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7623648B1 (en) * 2004-12-01 2009-11-24 Tellme Networks, Inc. Method and system of generating reference variations for directory assistance data
US9477940B2 (en) * 2007-07-23 2016-10-25 International Business Machines Corporation Relationship-centric portals for communication sessions
US20090319187A1 (en) * 2008-06-23 2009-12-24 Outside.In, Inc. Generating Geocoded Targeted Web Advertisements
US8037070B2 (en) * 2008-06-25 2011-10-11 Yahoo! Inc. Background contextual conversational search
US8886663B2 (en) * 2008-09-20 2014-11-11 Securus Technologies, Inc. Multi-party conversation analyzer and logger
US10594870B2 (en) 2009-01-21 2020-03-17 Truaxis, Llc System and method for matching a savings opportunity using census data
US10504126B2 (en) * 2009-01-21 2019-12-10 Truaxis, Llc System and method of obtaining merchant sales information for marketing or sales teams
US20110054912A1 (en) * 2009-09-01 2011-03-03 Christopher Anthony Silva System and method of storing telephone conversations
EP2299440B1 (en) * 2009-09-11 2012-10-31 Vodafone Holding GmbH Method and Device for automatic recognition of given keywords and/or terms within voice data
US20110076990A1 (en) * 2009-09-29 2011-03-31 Christopher Anthony Silva Method for recording mobile phone calls
US8428559B2 (en) 2009-09-29 2013-04-23 Christopher Anthony Silva Method for recording mobile phone calls
US20110228913A1 (en) * 2010-03-16 2011-09-22 Telcordia Technologies, Inc. Automatic extraction of information from ongoing voice communication system and methods
US9501802B2 (en) * 2010-05-04 2016-11-22 Qwest Communications International Inc. Conversation capture
US9356790B2 (en) 2010-05-04 2016-05-31 Qwest Communications International Inc. Multi-user integrated task list
US9559869B2 (en) 2010-05-04 2017-01-31 Qwest Communications International Inc. Video call handling
US8406390B1 (en) 2010-08-23 2013-03-26 Sprint Communications Company L.P. Pausing a live teleconference call
US9800721B2 (en) 2010-09-07 2017-10-24 Securus Technologies, Inc. Multi-party conversation analyzer and logger
US8687776B1 (en) * 2010-09-08 2014-04-01 Mongoose Metrics, LLC System and method to analyze human voice conversations
US9031839B2 (en) * 2010-12-01 2015-05-12 Cisco Technology, Inc. Conference transcription based on conference data
US8719031B2 (en) 2011-06-17 2014-05-06 At&T Intellectual Property I, L.P. Dynamic access to external media content based on speaker content
US9324323B1 (en) * 2012-01-13 2016-04-26 Google Inc. Speech recognition using topic-specific language models
US9479642B2 (en) * 2012-01-26 2016-10-25 Zoom International S.R.O. Enhanced quality monitoring
US8775177B1 (en) 2012-03-08 2014-07-08 Google Inc. Speech recognition process
US9275139B2 (en) * 2012-03-30 2016-03-01 Aurix Limited “At least” operator for combining audio search hits
EP2739024B1 (en) * 2012-11-30 2017-01-04 Alcatel Lucent A method and a module for shifting a call established through a first application server in order to route it through a second application server
US9460455B2 (en) * 2013-01-04 2016-10-04 24/7 Customer, Inc. Determining product categories by mining interaction data in chat transcripts
US9264532B2 (en) * 2013-01-31 2016-02-16 International Business Machines Corporation Technology for combating mobile phone criminal activity
EP2763136B1 (en) 2013-02-04 2016-04-06 Telefónica, S.A. Method and system for obtaining relevant information from a voice communication
US10498840B2 (en) * 2013-03-15 2019-12-03 Intelmate Llc Method and system for efficient review of exchanged content
US9020115B2 (en) 2013-05-09 2015-04-28 Hank Technology Llc Inmate communications
US9762462B2 (en) * 2014-02-28 2017-09-12 Verizon Patent And Licensing Inc. Method and apparatus for providing an anti-bullying service
US10237399B1 (en) 2014-04-01 2019-03-19 Securus Technologies, Inc. Identical conversation detection method and apparatus
US9621713B1 (en) 2014-04-01 2017-04-11 Securus Technologies, Inc. Identical conversation detection method and apparatus
KR102245098B1 (en) * 2014-05-23 2021-04-28 삼성전자주식회사 Mobile terminal and control method thereof
US9990433B2 (en) 2014-05-23 2018-06-05 Samsung Electronics Co., Ltd. Method for searching and device thereof
US11314826B2 (en) 2014-05-23 2022-04-26 Samsung Electronics Co., Ltd. Method for searching and device thereof
US9922048B1 (en) * 2014-12-01 2018-03-20 Securus Technologies, Inc. Automated background check via facial recognition
US9300791B1 (en) * 2014-12-11 2016-03-29 Securus Technologies, Inc. Controlled-environment facility resident communication detection
US9799049B2 (en) * 2014-12-15 2017-10-24 Nuance Communications, Inc. Enhancing a message by providing supplemental content in the message
US9854087B1 (en) 2015-09-09 2017-12-26 Securus Technologies, Inc. Contraband wireless communications device identification in controlled-environment facilities
US10236017B1 (en) * 2015-09-29 2019-03-19 Amazon Technologies, Inc. Goal segmentation in speech dialogs
US10394886B2 (en) * 2015-12-04 2019-08-27 Sony Corporation Electronic device, computer-implemented method and computer program
US10043517B2 (en) * 2015-12-09 2018-08-07 International Business Machines Corporation Audio-based event interaction analytics
US10511712B2 (en) * 2016-08-19 2019-12-17 Andrew Horton Caller identification in a secure environment using voice biometrics
US10224026B2 (en) * 2016-03-15 2019-03-05 Sony Corporation Electronic device, system, method and computer program
WO2017210582A1 (en) * 2016-06-03 2017-12-07 Babel Street, Inc. Geospatial origin and identity based on dialect detection for text based media
US10165073B1 (en) * 2016-06-28 2018-12-25 Securus Technologies, Inc. Multiple controlled-environment facility investigative data aggregation and analysis system access to and use of social media data
US20180011929A1 (en) * 2016-07-08 2018-01-11 Newvoicemedia, Ltd. Concept-based search and categorization
US10609094B1 (en) * 2016-10-05 2020-03-31 Securus Technologies, Inc. Controlled-environment facility resident contact tools for intelligent controlled-environment facility resident communication and/or media device interfaces
US10741197B2 (en) * 2016-11-15 2020-08-11 Amos Halava Computer-implemented criminal intelligence gathering system and method
US10074362B2 (en) * 2017-01-31 2018-09-11 Global Tel*Link Corporation System and method for assessing security threats and criminal proclivities
US9843448B1 (en) * 2017-06-07 2017-12-12 Global Tel*Link Corporation System and method for customizing inmate communication notification
US10091349B1 (en) 2017-07-11 2018-10-02 Vail Systems, Inc. Fraud detection system and method
US10623581B2 (en) 2017-07-25 2020-04-14 Vail Systems, Inc. Adaptive, multi-modal fraud detection system
JP6614395B2 (en) 2017-08-31 2019-12-04 ヤマハ株式会社 Information providing method and information providing apparatus
EP3528138A1 (en) * 2018-02-14 2019-08-21 Dr. Ing. h.c. F. Porsche AG Method and apparatus for location recognition
US10742799B2 (en) 2018-02-27 2020-08-11 Leo Technologies, Llc Automated speech-to-text processing and analysis of call data apparatuses, methods and systems
US11176929B1 (en) * 2018-06-21 2021-11-16 Kerberos International, Inc. Artificial intelligence (AI) language detection and translation system for scanning radio signals and rules-based transmission of alerts
US10904297B1 (en) 2019-06-17 2021-01-26 Securas Technologies, LLC Controlled-environment facility resident and associated non-resident telephone number investigative linkage to e-commerce application program purchases
US11295020B2 (en) 2019-08-05 2022-04-05 Bank Of America Corporation System for integrated natural language processing and event analysis for threat detection in computing systems
US10958779B1 (en) 2019-09-23 2021-03-23 Capital One Services, Llc Machine learning dataset generation using a natural language processing technique
CN112052053B (en) * 2020-10-10 2023-12-19 国科晋云技术有限公司 Method and system for cleaning ore mining program in high-performance computing cluster
US11640418B2 (en) * 2021-06-25 2023-05-02 Microsoft Technology Licensing, Llc Providing responses to queries of transcripts using multiple indexes
CN117076612B (en) * 2023-08-31 2024-02-20 宁夏恒信创达数据科技有限公司 Call center big data text mining system

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5634086A (en) * 1993-03-12 1997-05-27 Sri International Method and apparatus for voice-interactive language instruction
US5640490A (en) * 1994-11-14 1997-06-17 Fonix Corporation User independent, real-time speech recognition system and method
US5899972A (en) * 1995-06-22 1999-05-04 Seiko Epson Corporation Interactive voice recognition method and apparatus using affirmative/negative content discrimination
US20020002464A1 (en) * 1999-08-31 2002-01-03 Valery A. Petrushin System and method for a telephonic emotion detection that provides operator feedback
US20020010587A1 (en) * 1999-08-31 2002-01-24 Valery A. Pertrushin System, method and article of manufacture for a voice analysis system that detects nervousness for preventing fraud
US20020032566A1 (en) * 1996-02-09 2002-03-14 Eli Tzirkel-Hancock Apparatus, method and computer readable memory medium for speech recogniton using dynamic programming
US20030023444A1 (en) * 1999-08-31 2003-01-30 Vicki St. John A voice recognition system for navigating on the internet
US6633846B1 (en) * 1999-11-12 2003-10-14 Phoenix Solutions, Inc. Distributed realtime speech recognition system
US20040252184A1 (en) * 2003-06-16 2004-12-16 Hesse Thomas H. Video visitation station
US20050080625A1 (en) * 1999-11-12 2005-04-14 Bennett Ian M. Distributed real time speech recognition system
US20050114192A1 (en) * 2003-11-26 2005-05-26 Worldcom, Inc. Inmate visitation scheduling and management
US6907387B1 (en) * 2002-08-05 2005-06-14 Bellsouth Intellectual Property Corporation Systems and methods for remote monitoring of a facility location
US20050128283A1 (en) * 2003-12-16 2005-06-16 Bulriss Michael E. Video conference system providing private and attorney-client privileged communications
US20060064037A1 (en) * 2004-09-22 2006-03-23 Shalon Ventures Research, Llc Systems and methods for monitoring and modifying behavior
US20060087555A1 (en) * 2004-10-25 2006-04-27 3V Technologies Incorporated Systems and processes for scheduling and conducting audio/video communications
US20060200353A1 (en) * 1999-11-12 2006-09-07 Bennett Ian M Distributed Internet Based Speech Recognition System With Natural Language Support
US20070237099A1 (en) * 2006-03-29 2007-10-11 Microsoft Corporation Decentralized architecture and protocol for voice conferencing
US20080000966A1 (en) * 2006-06-30 2008-01-03 Evercom Systems, Inc. System and method for electronic visitation registration
US20080106370A1 (en) * 2006-11-02 2008-05-08 Viking Access Systems, Llc System and method for speech-recognition facilitated communication to monitor and control access to premises
US20080118045A1 (en) * 2006-11-22 2008-05-22 Evercom Sustems, Inc. Systems And Methods For Visitation Terminal User Identification
US20080201143A1 (en) * 2007-02-15 2008-08-21 Forensic Intelligence Detection Organization System and method for multi-modal audio mining of telephone conversations
US20080300878A1 (en) * 1999-11-12 2008-12-04 Bennett Ian M Method For Transporting Speech Data For A Distributed Recognition System
US7519169B1 (en) * 2004-09-28 2009-04-14 Evercom Systems, Inc. Systems and methods for management and dissemination of information from a controlled environment facility

Family Cites Families (299)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4054756A (en) 1976-09-29 1977-10-18 Bell Telephone Laboratories, Incorporated Method and apparatus for automating special service call handling
US4191860A (en) 1978-07-13 1980-03-04 Bell Telephone Laboratories, Incorporated Data base communication call processing method
JPS6010821Y2 (en) 1979-11-05 1985-04-12 三信整熱工業株式会社 Insulation tube manufacturing equipment
CA1175521A (en) 1980-04-09 1984-10-02 David D. Falconer Echo cancellation in two-wire full-duplex data transmission with estimation of far-end data components
JPS59225626A (en) 1983-06-06 1984-12-18 Nippon Telegr & Teleph Corp <Ntt> Echo canceller device for data transmitter
JPS6010821A (en) 1983-06-30 1985-01-21 Fujitsu Ltd Adaptive echo cancellor
US4670628A (en) 1984-04-19 1987-06-02 Boratgis James P Reprogrammable call forwarding device
JPS61135239A (en) 1984-12-06 1986-06-23 Matsushita Electric Ind Co Ltd Echo canceller
JPS61135239U (en) 1985-02-13 1986-08-23
US4691347A (en) 1985-02-15 1987-09-01 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for controlling a conference
US4918719A (en) 1986-10-08 1990-04-17 American Telephone And Telegraph Company Elimination of false requests for telephone operator assistance
IT1215490B (en) 1987-05-14 1990-02-14 Sgs Microelettronica Spa METHOD OF ATTENUATION OF THE ECHO SIGNAL IN CONVERSION CIRCUITS, SO CALLED BY TELEPHONE FORKS, INTENDED FOR TELEPHONE CONFERENCES, AND EQUIPMENT OPERATING ACCORDING TO SUCH METHOD.
US4813070A (en) 1987-11-19 1989-03-14 Royal Technology, Inc. Telephone intercept system
US4995030A (en) 1988-02-01 1991-02-19 Memotec Datacom, Inc. Far end echo cancellation method and apparatus
US4935956A (en) 1988-05-02 1990-06-19 Telequip Ventures, Inc. Automated public phone control for charge and collect billing
US4943973A (en) 1989-03-31 1990-07-24 At&T Company Spread-spectrum identification signal for communications system
JPH0365826A (en) 1989-08-04 1991-03-20 Nec Corp Echo eliminator
US5185781A (en) 1990-10-12 1993-02-09 At&T Bell Laboratories Automation of telephone operator assistance calls
JP2725218B2 (en) 1990-12-21 1998-03-11 株式会社リコス Distributed teleconferencing controller
US5229764A (en) 1991-06-20 1993-07-20 Matchett Noel D Continuous biometric authentication matrix
US5210789A (en) 1991-06-28 1993-05-11 International Telecharge, Inc. Interactive telephone operator terminal
US5345501A (en) 1991-07-15 1994-09-06 Bell Atlantic Network Services, Inc. Telephone central office based method of and system for processing customer orders
WO1993012606A1 (en) 1991-12-12 1993-06-24 Cellular Technical Services Company, Inc. Real-time information system for cellular telephones
US5319735A (en) 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling
US5646940A (en) 1992-05-04 1997-07-08 Novi International, Inc. System for simultaneous analog and digital communications over an analog channel
US5319702A (en) 1992-07-29 1994-06-07 Tele-Matic Corporation Method and apparatus for detecting and responding to hook flash events occurring on a remote telephone
US5539812A (en) 1992-07-29 1996-07-23 Kitchin; Dwight W. Method and apparatus for detecting an attempted three-way conference call on a remote telephone
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
SE518247C2 (en) 1992-08-28 2002-09-17 Ericsson Telefon Ab L M Software structure for a telecommunications system
CA2105034C (en) 1992-10-09 1997-12-30 Biing-Hwang Juang Speaker verification with cohort normalized scoring
JP3065826B2 (en) 1992-11-11 2000-07-17 株式会社いすゞセラミックス研究所 Control device for high compression ratio engine for vaporized fuel
US5345595A (en) 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5379345A (en) 1993-01-29 1995-01-03 Radio Audit Systems, Inc. Method and apparatus for the processing of encoded data in conjunction with an audio broadcast
US5420910B1 (en) 1993-06-29 1998-02-17 Airtouch Communications Inc Method and apparatus for fraud control in cellular telephone systems utilizing rf signature comparison
US5535261A (en) 1993-08-20 1996-07-09 Gateway Technologies, Inc. Selectively activated integrated real-time recording of telephone conversations
US5485507A (en) 1993-08-20 1996-01-16 Gateway Technologies, Inc. Integrated commissary system
ES2138649T3 (en) 1993-09-22 2000-01-16 Teknekron Infoswitch Corp MONITORING OF TELECOMMUNICATION SYSTEMS.
JP2986345B2 (en) 1993-10-18 1999-12-06 インターナショナル・ビジネス・マシーンズ・コーポレイション Voice recording indexing apparatus and method
US5469370A (en) 1993-10-29 1995-11-21 Time Warner Entertainment Co., L.P. System and method for controlling play of multiple audio tracks of a software carrier
ES2156456T3 (en) 1993-11-18 2001-06-16 Digimarc Corp VIDEO COPY CONTROL WITH VARIOUS SIGNALS INCRUSTED.
US5822436A (en) 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5841886A (en) 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US5841978A (en) 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US5710834A (en) 1995-05-08 1998-01-20 Digimarc Corporation Method and apparatus responsive to a code signal conveyed through a graphic image
US5862260A (en) 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US5748763A (en) 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US6983051B1 (en) 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
US5832119C1 (en) 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US5748783A (en) 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding
US6122403A (en) 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US5768426A (en) 1993-11-18 1998-06-16 Digimarc Corporation Graphics processing system employing embedded code signals
DE69532394T2 (en) 1994-02-10 2004-11-04 Nippon Telegraph And Telephone Corp. Method and device for echo cancellation using the "fast projection scheme"
US5425091A (en) 1994-02-28 1995-06-13 U S West Technologies, Inc. Method and system for providing an automatic customer callback service
US5438616A (en) 1994-03-02 1995-08-01 Peoples; John T. Method and apparatus for storing telephone numbers and for automatically calling the stored numbers
US7106843B1 (en) 1994-04-19 2006-09-12 T-Netix, Inc. Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
US20010036821A1 (en) 1994-04-19 2001-11-01 Jay L. Gainsboro Computer-based method and apparatus for controlling, monitoring, recording and reporting wireless communications
US5926533A (en) 1994-04-19 1999-07-20 Opus Telecom, Inc. Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
US5655013A (en) 1994-04-19 1997-08-05 Gainsboro; Jay L. Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access
US5832068A (en) 1994-06-01 1998-11-03 Davox Corporation Data processing system with real time priority updating of data records and dynamic record exclusion
US5502762A (en) 1994-06-10 1996-03-26 Andrew; Brian J. System and method for simultaneously controlling ringing at local and remote telephones
US5590171A (en) 1994-07-07 1996-12-31 Bellsouth Corporation Method and apparatus for communications monitoring
US5535194A (en) 1994-07-14 1996-07-09 Motorola, Inc. Method and apparatus for echo canceling with double-talk immunity
CA2159384C (en) 1994-10-18 1998-09-22 Barry H. Freedman Method for processing collect telephone calls
IL115892A (en) 1994-11-10 1999-05-09 British Telecomm Interference detection system for telecommunications
US5745569A (en) 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
JPH08191346A (en) 1995-01-11 1996-07-23 Nec Corp Subscriber speech monitor system
EP1526472A3 (en) 1995-02-13 2006-07-26 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7133845B1 (en) 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
US5774452A (en) 1995-03-14 1998-06-30 Aris Technologies, Inc. Apparatus and method for encoding and decoding information in audio signals
US5583925A (en) 1995-03-22 1996-12-10 Lucent Technologies, Inc. Automatic three-way calling feature for a telecommunications system
WO1996031043A1 (en) 1995-03-30 1996-10-03 British Telecommunications Public Limited Company Detecting possible fraudulent communications usage
US5749066A (en) 1995-04-24 1998-05-05 Ericsson Messaging Systems Inc. Method and apparatus for developing a neural network for phoneme recognition
US5793415A (en) 1995-05-15 1998-08-11 Imagetel International Inc. Videoconferencing and multimedia system
US5592548A (en) 1995-05-31 1997-01-07 Qualcomm Incorporated System and method for avoiding false convergence in the presence of tones in a time-domain echo cancellation process
DE19520232C1 (en) 1995-06-01 1996-08-14 Siemens Ag Sequence coding for ASCII text encryption
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5619561A (en) 1995-06-22 1997-04-08 Reese; Morris Call-waiting and caller identification with three-way conversations arrangements
JP2856113B2 (en) 1995-07-10 1999-02-10 日本電気株式会社 Echo canceller
DE69636084T2 (en) 1995-09-28 2006-09-14 Nec Corp. Method and apparatus for inserting a spread spectrum watermark into multimedia data
US5745558A (en) * 1995-10-27 1998-04-28 United States Advanced Network, Inc. Three-way call detection and response system
US5805685A (en) 1995-11-15 1998-09-08 Gateway Technologies, Inc. Three way call detection by counting signal characteristics
US5796811A (en) 1995-11-15 1998-08-18 Gateway Technologies, Inc. Three way call detection
US5719937A (en) 1995-12-06 1998-02-17 Solana Technology Develpment Corporation Multi-media copy management system
US7092494B1 (en) 1996-01-16 2006-08-15 Global Tel★Link Corporation Telephone system
US6052454A (en) 1996-01-16 2000-04-18 Global Tel*Link Corp. Telephone apparatus with recording of phone conversations on massive storage
US5822432A (en) 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US5867562A (en) 1996-04-17 1999-02-02 Scherer; Gordon F. Call processing system with call screening
US20030040326A1 (en) 1996-04-25 2003-02-27 Levy Kenneth L. Wireless methods and devices employing steganography
US5768355A (en) 1996-05-16 1998-06-16 Science Dynamics Corporation Three-way call detection system
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US5835486A (en) 1996-07-11 1998-11-10 Dsc/Celcore, Inc. Multi-channel transcoder rate adapter having low delay and integral echo cancellation
US6308171B1 (en) 1996-07-30 2001-10-23 Carlos De La Huerga Method and system for automated data storage and retrieval
US5953049A (en) 1996-08-02 1999-09-14 Lucent Technologies Inc. Adaptive audio delay control for multimedia conferencing
US5923746A (en) 1996-09-18 1999-07-13 Rockwell International Corp. Call recording system and method for use with a telephonic switch
WO1998013993A1 (en) 1996-09-25 1998-04-02 British Telecommunications Public Limited Company Apparatus for communications service provision
US5861810C1 (en) 1996-09-27 2001-02-27 Interactive Systems Llc System and method for providing crime victims updated informations and emergency alert notices
US5915001A (en) 1996-11-14 1999-06-22 Vois Corporation System and method for providing and using universally accessible voice and speech data files
US6263507B1 (en) 1996-12-05 2001-07-17 Interval Research Corporation Browser for use in navigating a body of information, with particular application to browsing information represented by audiovisual data
US6035034A (en) 1996-12-20 2000-03-07 Telefonaktiebolaget L M Ericsson (Publ) Double talk and echo path change detection in a telephony system
US6654060B1 (en) * 1997-01-07 2003-11-25 Canon Kabushiki Kaisha Video-image control apparatus and method and storage medium
US6175831B1 (en) 1997-01-17 2001-01-16 Six Degrees, Inc. Method and apparatus for constructing a networking database and system
US5920834A (en) 1997-01-31 1999-07-06 Qualcomm Incorporated Echo canceller with talk state determination to control speech processor functional elements in a digital telephone system
US6078645A (en) 1997-02-20 2000-06-20 Lucent Technologies Inc. Apparatus and method for monitoring full duplex data communications
US5920861A (en) 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
US6038315A (en) 1997-03-17 2000-03-14 The Regents Of The University Of California Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy
US5999828A (en) 1997-03-19 1999-12-07 Qualcomm Incorporated Multi-user wireless telephone having dual echo cancellers
US6141406A (en) 1997-03-27 2000-10-31 T-Netix, Inc. Method and apparatus for detecting a secondary destination of a telephone call based on changes in the telephone signal path
US6173284B1 (en) 1997-05-20 2001-01-09 University Of Charlotte City Of Charlotte Systems, methods and computer program products for automatically monitoring police records for a crime profile
JP4477148B2 (en) 1997-06-18 2010-06-09 クラリティー リミテッド ライアビリティ カンパニー Blind signal separation method and apparatus
GB2327173B (en) 1997-07-09 2002-05-22 Ibm Voice recognition of telephone conversations
US6052462A (en) 1997-07-10 2000-04-18 Tellabs Operations, Inc. Double talk detection and echo control circuit
US6078807A (en) 1997-08-26 2000-06-20 International Business Machines Corporation Telephony fraud detection using voice recognition techniques
US6011849A (en) 1997-08-28 2000-01-04 Syndata Technologies, Inc. Encryption-based selection system for steganography
US6782370B1 (en) 1997-09-04 2004-08-24 Cendant Publishing, Inc. System and method for providing recommendation of goods or services based on recorded purchasing history
US6118860A (en) 1997-09-12 2000-09-12 Nortel Networks Corporation Public communications services vending method and apparatus
US5937035A (en) 1997-09-15 1999-08-10 Lucent Technologies Inc. Interswitch telephone status monitoring
US5991373A (en) 1997-09-15 1999-11-23 Teknekron Infoswitch Corporation Reproduction of a voice and video session
US6850609B1 (en) 1997-10-28 2005-02-01 Verizon Services Corp. Methods and apparatus for providing speech recording and speech transcription services
US5960080A (en) * 1997-11-07 1999-09-28 Justsystem Pittsburgh Research Center Method for transforming message containing sensitive information
US6064963A (en) 1997-12-17 2000-05-16 Opus Telecom, L.L.C. Automatic key word or phrase speech recognition for the corrections industry
US6336093B2 (en) 1998-01-16 2002-01-01 Avid Technology, Inc. Apparatus and method using speech recognition and scripts to capture author and playback synchronized audio and video
US6324650B1 (en) 1998-03-16 2001-11-27 John W.L. Ogilvie Message content protection and conditional disclosure
US6160903A (en) 1998-04-24 2000-12-12 Dew Engineering And Development Limited Method of providing secure user access
US6243480B1 (en) 1998-04-30 2001-06-05 Jian Zhao Digital authentication with analog documents
US6381321B1 (en) 1998-05-04 2002-04-30 T-Netix, Inc. Telecommunication resource allocation system and method
US20010043697A1 (en) 1998-05-11 2001-11-22 Patrick M. Cox Monitoring of and remote access to call center activity
US6233347B1 (en) 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6314192B1 (en) 1998-05-21 2001-11-06 Massachusetts Institute Of Technology System, method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6054928A (en) 1998-06-04 2000-04-25 Lemelson Jerome H. Prisoner tracking and warning system and corresponding methods
DE19841166A1 (en) 1998-09-09 2000-03-16 Deutsche Telekom Ag Procedure for controlling the access authorization for voice telephony on a landline or mobile phone connection and communication network
US7274928B2 (en) 1998-10-02 2007-09-25 Telespree Communications Portable cellular phone system having automatic initialization
US6665376B1 (en) 1998-10-23 2003-12-16 T-Netix, Inc. Selectively activated integrated real-time recording of telephone conversations with automated documentation of consent to call recording
US6898612B1 (en) 1998-11-12 2005-05-24 Sarnoff Corporation Method and system for on-line blind source separation
US7133511B2 (en) 1998-12-11 2006-11-07 Securelogix Corporation Telephony security system
US6243676B1 (en) 1998-12-23 2001-06-05 Openwave Systems Inc. Searching and retrieving multimedia information
US6526380B1 (en) 1999-03-26 2003-02-25 Koninklijke Philips Electronics N.V. Speech recognition system having parallel large vocabulary recognition engines
JP2000286737A (en) * 1999-03-30 2000-10-13 Kokusai Electric Co Ltd Amplifier
US6421645B1 (en) 1999-04-09 2002-07-16 International Business Machines Corporation Methods and apparatus for concurrent speech recognition, speaker segmentation and speaker classification
US6345252B1 (en) 1999-04-09 2002-02-05 International Business Machines Corporation Methods and apparatus for retrieving audio information using content and speaker information
ATE347617T1 (en) 1999-05-06 2006-12-15 Sinai School Medicine DNA-BASED STEGANOGRAPHY
EP1196872A4 (en) 1999-05-15 2004-04-07 John W L Ogilvie Automatic broker tools and techniques
US6249570B1 (en) 1999-06-08 2001-06-19 David A. Glowny System and method for recording and storing telephone call information
US6671292B1 (en) 1999-06-25 2003-12-30 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for adaptive voice buffering
JP3065826U (en) 1999-07-16 2000-02-08 日東河川工業株式会社 Drain recovery device for rubber weir
US6219640B1 (en) 1999-08-06 2001-04-17 International Business Machines Corporation Methods and apparatus for audio-visual speaker recognition and utterance verification
US6665644B1 (en) * 1999-08-10 2003-12-16 International Business Machines Corporation Conversational data mining
US6463415B2 (en) 1999-08-31 2002-10-08 Accenture Llp 69voice authentication system and method for regulating border crossing
US6763099B1 (en) 1999-11-05 2004-07-13 T-Netix, Inc. Advanced three way call detection system and method using spread spectrum techniques
US20020069084A1 (en) 2000-01-03 2002-06-06 Donovan John K. Method and system for countering terrorism and monitoring visitors from abroad
GB0000735D0 (en) 2000-01-13 2000-03-08 Eyretel Ltd System and method for analysing communication streams
US6760697B1 (en) 2000-01-25 2004-07-06 Minds And Technology, Inc. Centralized processing of digital speech data originated at the network clients of a set of servers
US6411683B1 (en) * 2000-02-09 2002-06-25 At&T Corp. Automated telephone call designation system
US6542602B1 (en) * 2000-02-14 2003-04-01 Nice Systems Ltd. Telephone call monitoring system
AU2001245927A1 (en) 2000-03-24 2001-10-08 Dragon Systems, Inc. Lexical analysis of telephone conversations with call center agents
US6647096B1 (en) * 2000-04-11 2003-11-11 Telequip Labs, Inc. System and method for remotely controlling automated call placement call monitoring functions
US7010617B2 (en) * 2000-05-02 2006-03-07 Sun Microsystems, Inc. Cluster configuration repository
US6211783B1 (en) 2000-05-04 2001-04-03 Randall Wang Action control process of security alarm system
US6389293B1 (en) 2000-05-09 2002-05-14 Cidco Communications Llc Method and apparatus for providing call screening on cordless telephone equipment using three-way calling
US6748356B1 (en) 2000-06-07 2004-06-08 International Business Machines Corporation Methods and apparatus for identifying unknown speakers using a hierarchical tree structure
US6668044B1 (en) * 2000-07-19 2003-12-23 Xtend Communications Corp. System and method for recording telephonic communications
US6697858B1 (en) 2000-08-14 2004-02-24 Telephony@Work Call center
US6639977B1 (en) 2000-08-17 2003-10-28 Evercom Systems, Inc. System and method for reverse billing of a telephone call
US6636591B1 (en) 2000-08-17 2003-10-21 Evercom Systems, Inc. System and method for affecting inmate conduct with good behavior discount telephone rates
US7075919B1 (en) 2000-08-22 2006-07-11 Cisco Technology, Inc. System and method for providing integrated voice, video and data to customer premises over a single network
KR20030027965A (en) * 2000-08-23 2003-04-07 유니버시티 오브 버지니아 페이턴트 파운데이션 Automated storage and retrieval apparatus for freezers and related method thereof
WO2002023468A1 (en) 2000-09-11 2002-03-21 Digimarc Corporation Authenticating and measuring quality of service of multimedia signals using digital watermark analyses
US7236932B1 (en) 2000-09-12 2007-06-26 Avaya Technology Corp. Method of and apparatus for improving productivity of human reviewers of automatically transcribed documents generated by media conversion systems
GB2368177A (en) 2000-10-17 2002-04-24 Ncr Int Inc A financial transaction system
US6668045B1 (en) 2000-10-30 2003-12-23 T-Netix, Inc. Message screening, delivery and billing system
US20020078042A1 (en) * 2000-12-19 2002-06-20 Telefonaktiebolaget L M Ericsson (Pub1) System and method for determining affinity relationships
US6625261B2 (en) 2000-12-20 2003-09-23 Southwestern Bell Communications Services, Inc. Method, system and article of manufacture for bookmarking voicemail messages
US20020107871A1 (en) 2001-02-05 2002-08-08 Knowledge Computing Corporation Method and system for database migration and association
US7191133B1 (en) 2001-02-15 2007-03-13 West Corporation Script compliance using speech recognition
US6970554B1 (en) 2001-03-05 2005-11-29 Verizon Corporate Services Group Inc. System and method for observing calls to a call center
US6788772B2 (en) 2001-03-07 2004-09-07 Zvi Barak System and method for controlling outgoing telephone calls
US7599351B2 (en) 2001-03-20 2009-10-06 Verizon Business Global Llc Recursive query for communications network data
US7103549B2 (en) 2001-03-22 2006-09-05 Intel Corporation Method for improving speech recognition performance using speaker and channel information
US6751607B2 (en) 2001-04-04 2004-06-15 Thomas A. Kraay System and method for the identification of latent relationships amongst data elements in large databases
US7039700B2 (en) 2001-04-04 2006-05-02 Chatguard.Com System and method for monitoring and analyzing communications
US7039585B2 (en) 2001-04-10 2006-05-02 International Business Machines Corporation Method and system for searching recorded speech and retrieving relevant segments
US6995664B1 (en) 2001-06-20 2006-02-07 Jeffrey Darling Remote supervision system and method
US20030002639A1 (en) 2001-07-02 2003-01-02 Huie David L. Real-time call validation system
US7505406B1 (en) 2001-07-13 2009-03-17 Evercom Systems, Inc. Public telephone control with voice over internet protocol transmission
US7899167B1 (en) 2003-08-15 2011-03-01 Securus Technologies, Inc. Centralized call processing
US7380279B2 (en) 2001-07-16 2008-05-27 Lenel Systems International, Inc. System for integrating security and access for facilities and information systems
US7953219B2 (en) 2001-07-19 2011-05-31 Nice Systems, Ltd. Method apparatus and system for capturing and analyzing interaction based content
DE60108104T2 (en) 2001-07-24 2005-12-15 Sony International (Europe) Gmbh Method for speaker identification
US6614884B2 (en) 2001-08-17 2003-09-02 Jung Kee Jang Automatic home alarm system and method
US7079636B1 (en) 2001-09-21 2006-07-18 Evercom Systems, Inc. Three-way telephone call prevention system and method
US20030070076A1 (en) 2001-10-05 2003-04-10 Michael Kenneth W. System and method for providing personal information about criminal offenders to a plurality of law enforcement agencies
US6895086B2 (en) 2001-11-13 2005-05-17 Inmate Telephone, Inc. 3-Way call detection system and method
US20030099337A1 (en) 2001-11-27 2003-05-29 Lord H. Michael Method and apparatus for exchanging data between a primary computer system and an external computer system to ensure transactional reconciliation between the systems
US7032007B2 (en) 2001-12-05 2006-04-18 International Business Machines Corporation Apparatus and method for monitoring instant messaging accounts
US6639978B2 (en) 2001-12-17 2003-10-28 Evercom Systems, Inc. Method for determining an entity responsible for billing a called party
US7085359B2 (en) 2001-12-24 2006-08-01 Mci, Llc Investigation and reporting of inmate security threats
US7039171B2 (en) 2001-12-24 2006-05-02 Mci, Llc Method and system for call tracking to discover inmate-employee fraternization
US7047296B1 (en) 2002-01-28 2006-05-16 Witness Systems, Inc. Method and system for selectively dedicating resources for recording data exchanged between entities attached to a network
US7424715B1 (en) 2002-01-28 2008-09-09 Verint Americas Inc. Method and system for presenting events associated with recorded data exchanged between a server and a user
US6688518B1 (en) 2002-01-31 2004-02-10 Anthony Valencia Wall-mounted touch screen information system
US7046779B2 (en) 2002-02-15 2006-05-16 Multimedia Telesys, Inc. Video conference system and methods for use at multi-station sites
US7406039B2 (en) 2002-02-26 2008-07-29 Dell Products L.P. System and method for a failover protocol in storage area network controllers
US20030190045A1 (en) 2002-04-03 2003-10-09 Huberman Bernardo A. Apparatus and method for protecting privacy while revealing data
US6836540B2 (en) 2002-04-29 2004-12-28 Evercom Systems, Inc. Systems and methods for offering a service to a party associated with a blocked call
US8135115B1 (en) 2006-11-22 2012-03-13 Securus Technologies, Inc. System and method for multi-channel recording
US7860222B1 (en) 2003-11-24 2010-12-28 Securus Technologies, Inc. Systems and methods for acquiring, accessing, and analyzing investigative information
US7698182B2 (en) 2002-04-29 2010-04-13 Evercom Systems, Inc. Optimizing profitability in business transactions
US7079637B1 (en) 2003-04-22 2006-07-18 Evercom Systems, Inc. System and method for detecting unauthorized call activity
US7494061B2 (en) 2006-06-30 2009-02-24 Evercom Systems, Inc. Systems and methods for identity verification using continuous biometric monitoring
US20040008828A1 (en) * 2002-07-09 2004-01-15 Scott Coles Dynamic information retrieval system utilizing voice recognition
GB2391373A (en) * 2002-07-31 2004-02-04 David Toms A system for the automatic detection of a fraudulent transaction
US7333798B2 (en) 2002-08-08 2008-02-19 Value Added Communications, Inc. Telecommunication call management and monitoring system
US7886359B2 (en) 2002-09-18 2011-02-08 Symantec Corporation Method and apparatus to report policy violations in messages
US7050918B2 (en) 2002-10-07 2006-05-23 Lecroy Corporation Digital group delay compensator
US7076427B2 (en) * 2002-10-18 2006-07-11 Ser Solutions, Inc. Methods and apparatus for audio data monitoring and evaluation using speech recognition
US7133828B2 (en) * 2002-10-18 2006-11-07 Ser Solutions, Inc. Methods and apparatus for audio data analysis and data mining using speech recognition
US6810480B1 (en) 2002-10-21 2004-10-26 Sprint Communications Company L.P. Verification of identity and continued presence of computer users
US7133831B2 (en) 2002-10-23 2006-11-07 International Business Machines Corporation System and method for processing personal telephony recorder commands
US6947525B2 (en) 2002-12-20 2005-09-20 Lucent Technologies Inc. Monitoring system for a remote telephone station
US7730407B2 (en) 2003-02-28 2010-06-01 Fuji Xerox Co., Ltd. Systems and methods for bookmarking live and recorded multimedia documents
US7366782B2 (en) 2003-04-14 2008-04-29 At&T Corp. Systems and methods for termination of session initiation protocol
US6914772B2 (en) 2003-06-16 2005-07-05 Multimedia Telesys, Inc. Video conference system enclosure
JP2005010691A (en) * 2003-06-20 2005-01-13 P To Pa:Kk Apparatus and method for speech recognition, apparatus and method for conversation control, and program therefor
US20050010411A1 (en) * 2003-07-09 2005-01-13 Luca Rigazio Speech data mining for call center management
CA2534767A1 (en) 2003-08-05 2005-03-17 Inmate Telephone, Inc. Three-way call detection using steganography
US7529357B1 (en) * 2003-08-15 2009-05-05 Evercom Systems, Inc. Inmate management and call processing systems and methods
US20050125226A1 (en) 2003-10-29 2005-06-09 Paul Magee Voice recognition system and method
US7133512B2 (en) 2003-10-30 2006-11-07 International Business Machines Corporation Conference call aggregation using an interactive voice response system
US20050102371A1 (en) 2003-11-07 2005-05-12 Emre Aksu Streaming from a server to a client
US20070244690A1 (en) * 2003-11-21 2007-10-18 Koninklijke Philips Electronic, N.V. Clustering of Text for Structuring of Text Documents and Training of Language Models
US7551732B2 (en) 2003-12-08 2009-06-23 Global Tel*Link Corporation Centralized voice over IP recording and retrieval method and apparatus
US9288000B2 (en) * 2003-12-17 2016-03-15 International Business Machines Corporation Monitoring a communication and retrieving information relevant to the communication
US20130179949A1 (en) 2004-01-22 2013-07-11 Jpay, Inc. Secure exchange of digital content
US20100299761A1 (en) 2004-01-22 2010-11-25 Jpay, Inc. System and method for sending electronic data to inmates
KR100612839B1 (en) * 2004-02-18 2006-08-18 삼성전자주식회사 Method and apparatus for domain-based dialog speech recognition
JP2005269347A (en) 2004-03-19 2005-09-29 Nec Personal Products Co Ltd Multipoint conference system using ip network, and configuration method thereof
US7062286B2 (en) 2004-04-05 2006-06-13 Motorola, Inc. Conversion of calls from an ad hoc communication network
US20050256746A1 (en) * 2004-05-14 2005-11-17 Zaleski John R System for managing recorded audio medical information
US7639791B2 (en) 2004-05-21 2009-12-29 Value-Added Communications, Inc. Means and method for detecting three-way call attempts
US7672845B2 (en) 2004-06-22 2010-03-02 International Business Machines Corporation Method and system for keyword detection using voice-recognition
US8031849B1 (en) 2004-09-03 2011-10-04 Confinement Telephony Technology, Llc Telephony system and method with enhanced fraud control
US7496345B1 (en) 2004-09-30 2009-02-24 Evercom Systems, Inc. Systems and methods for processing calls directed to telephones having a portable interface
KR100689396B1 (en) * 2004-10-29 2007-03-02 삼성전자주식회사 Apparatus and method of managing call history using speech recognition
US7742581B2 (en) 2004-11-24 2010-06-22 Value-Added Communications, Inc. Electronic messaging exchange
US7280816B2 (en) 2004-12-23 2007-10-09 Agere Systems Inc. Techniques for monitoring mobile telecommunications for shared accounts
US20060198504A1 (en) 2005-01-21 2006-09-07 Shemisa Yousef O Call recording platform
US8243891B2 (en) 2005-01-28 2012-08-14 Value-Added Communications, Inc. Voice message exchange
US7783021B2 (en) * 2005-01-28 2010-08-24 Value-Added Communications, Inc. Digital telecommunications call management and monitoring system
US7742582B2 (en) 2005-02-17 2010-06-22 Core Systems (Ni) Limited Offender message delivery system
US7386105B2 (en) 2005-05-27 2008-06-10 Nice Systems Ltd Method and apparatus for fraud detection
US9300790B2 (en) 2005-06-24 2016-03-29 Securus Technologies, Inc. Multi-party conversation analyzer and logger
US7848510B2 (en) 2005-07-22 2010-12-07 Cisco Technology, Inc. Method and system for recording automatic call distributor calls
US20070047734A1 (en) 2005-08-26 2007-03-01 Sbc Knowledge Ventures, L.P. Inmate telephone absent an inmate-accessible hook switch button
US7596498B2 (en) * 2005-09-02 2009-09-29 Microsoft Corporation Monitoring, mining, and classifying electronically recordable conversations
US20070133437A1 (en) 2005-12-13 2007-06-14 Wengrovitz Michael S System and methods for enabling applications of who-is-speaking (WIS) signals
US8164461B2 (en) 2005-12-30 2012-04-24 Healthsense, Inc. Monitoring task performance
CA2536976A1 (en) 2006-02-20 2007-08-20 Diaphonics, Inc. Method and apparatus for detecting speaker change in a voice transaction
US20070195703A1 (en) 2006-02-22 2007-08-23 Living Independently Group Inc. System and method for monitoring a site using time gap analysis
US7804941B2 (en) 2006-06-30 2010-09-28 Securus Technologies, Inc. Systems and methods for message delivery in a controlled environment facility
US9892650B2 (en) 2006-09-11 2018-02-13 Houghton Mifflin Harcourt Publishing Company Recovery of polled data after an online test platform failure
US7822605B2 (en) 2006-10-19 2010-10-26 Nice Systems Ltd. Method and apparatus for large population speaker identification in telephone interactions
US8031052B2 (en) 2006-11-22 2011-10-04 Securus Technologies, Inc. Systems and methods for radio frequency identification
US7961860B1 (en) 2006-11-22 2011-06-14 Securus Technologies, Inc. Systems and methods for graphically displaying and analyzing call treatment operations
US8542802B2 (en) 2007-02-15 2013-09-24 Global Tel*Link Corporation System and method for three-way call detection
US8949266B2 (en) 2007-03-07 2015-02-03 Vlingo Corporation Multiple web-based content category searching in mobile search application
US8886663B2 (en) 2008-09-20 2014-11-11 Securus Technologies, Inc. Multi-party conversation analyzer and logger
US8630726B2 (en) 2009-02-12 2014-01-14 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US8458732B2 (en) 2009-08-19 2013-06-04 Core Systems (Ni) Limited Inmate information center for correctional facility processing
US10672286B2 (en) 2010-03-14 2020-06-02 Kryterion, Inc. Cloud based test environment
US20130104246A1 (en) 2010-04-30 2013-04-25 Howard R. Bear E-mail, text, and message monitoring system and method
US8926335B2 (en) 2010-05-12 2015-01-06 Verificient Technologies, Inc. System and method for remote test administration and monitoring
US9800721B2 (en) 2010-09-07 2017-10-24 Securus Technologies, Inc. Multi-party conversation analyzer and logger
US9332014B2 (en) 2011-04-05 2016-05-03 Securus Technologies, Inc. Distribution of broadcast content to controlled-environment facilities
US9030292B2 (en) 2011-04-18 2015-05-12 Telmate, Llc Interactive audio/video system and device for use in a secure facility
US8498937B1 (en) 2011-11-11 2013-07-30 Tech Friends, Inc. Managing financial accounts associated with residents of controlled-environment facilities
US20130124192A1 (en) 2011-11-14 2013-05-16 Cyber360, Inc. Alert notifications in an online monitoring system
US9124763B2 (en) 2012-02-01 2015-09-01 Homewav, Llc Method and apparatus for providing both audio/video visitation and VOIP telephonic visitation originated either by an inmate or by an outside visitor directly between inmates of a prison and an outside visitor without need of intervention by prison personnel
US9621504B2 (en) 2012-04-04 2017-04-11 Intelmate Llc Method and system for secure social networking on feature phones
US9247200B2 (en) 2013-03-14 2016-01-26 Keefe Group, Llc Controlled environment facility video visitation systems and methods
US10003698B2 (en) 2013-03-15 2018-06-19 Intelmate Llc Method and system for financing of inmate mobile devices
US8917848B2 (en) 2013-03-15 2014-12-23 Telmate, Llc Call management for secure facilities
US9307386B2 (en) 2013-03-22 2016-04-05 Global Tel*Link Corporation Multifunction wireless device
US9305298B2 (en) 2013-03-22 2016-04-05 Nok Nok Labs, Inc. System and method for location-based authentication
US9020115B2 (en) 2013-05-09 2015-04-28 Hank Technology Llc Inmate communications
US9728073B2 (en) 2013-12-18 2017-08-08 Sdb Ip Holdings, Llc Plumbing control system with distress signal
US9692718B2 (en) 2014-01-30 2017-06-27 World Emergency Network—Nevada, Ltd. Inmate communication system
WO2015120084A1 (en) 2014-02-04 2015-08-13 Secure Gravity Inc. Methods and systems configured to detect and guarantee identity
US9621713B1 (en) 2014-04-01 2017-04-11 Securus Technologies, Inc. Identical conversation detection method and apparatus
US9094500B1 (en) 2014-07-02 2015-07-28 Securus Technologies, Inc. Controlled communication between residents of controlled-environment facilities
US8929525B1 (en) 2014-07-03 2015-01-06 Securus Technologies, Inc. On-demand video communication for controlled-environment facility residents
US20160191484A1 (en) 2014-07-09 2016-06-30 Intelmate Llc Secure Inmate Digital Storage
US9959777B2 (en) 2014-08-22 2018-05-01 Intelligent Technologies International, Inc. Secure testing device, system and method
US20160224538A1 (en) 2015-01-30 2016-08-04 First Advantage Litigation Consulting Dba Consilio Systems and methods for electronic document review
US20160373909A1 (en) 2015-06-17 2016-12-22 Hive Life, LLC Wireless audio, security communication and home automation
US20160371756A1 (en) 2015-06-19 2016-12-22 T-Mobile, Usa, Inc. Seamless sharing of customer support chat sessions
US10572961B2 (en) 2016-03-15 2020-02-25 Global Tel*Link Corporation Detection and prevention of inmate to inmate message relay
US9558523B1 (en) 2016-03-23 2017-01-31 Global Tel* Link Corp. Secure nonscheduled video visitation system
US9609121B1 (en) 2016-04-07 2017-03-28 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5634086A (en) * 1993-03-12 1997-05-27 Sri International Method and apparatus for voice-interactive language instruction
US5640490A (en) * 1994-11-14 1997-06-17 Fonix Corporation User independent, real-time speech recognition system and method
US5899972A (en) * 1995-06-22 1999-05-04 Seiko Epson Corporation Interactive voice recognition method and apparatus using affirmative/negative content discrimination
US20020032566A1 (en) * 1996-02-09 2002-03-14 Eli Tzirkel-Hancock Apparatus, method and computer readable memory medium for speech recogniton using dynamic programming
US20030023444A1 (en) * 1999-08-31 2003-01-30 Vicki St. John A voice recognition system for navigating on the internet
US20020010587A1 (en) * 1999-08-31 2002-01-24 Valery A. Pertrushin System, method and article of manufacture for a voice analysis system that detects nervousness for preventing fraud
US20020002464A1 (en) * 1999-08-31 2002-01-03 Valery A. Petrushin System and method for a telephonic emotion detection that provides operator feedback
US20080300878A1 (en) * 1999-11-12 2008-12-04 Bennett Ian M Method For Transporting Speech Data For A Distributed Recognition System
US6633846B1 (en) * 1999-11-12 2003-10-14 Phoenix Solutions, Inc. Distributed realtime speech recognition system
US20070185717A1 (en) * 1999-11-12 2007-08-09 Bennett Ian M Method of interacting through speech with a web-connected server
US20050080625A1 (en) * 1999-11-12 2005-04-14 Bennett Ian M. Distributed real time speech recognition system
US20060200353A1 (en) * 1999-11-12 2006-09-07 Bennett Ian M Distributed Internet Based Speech Recognition System With Natural Language Support
US20080021708A1 (en) * 1999-11-12 2008-01-24 Bennett Ian M Speech recognition system interactive agent
US20050144004A1 (en) * 1999-11-12 2005-06-30 Bennett Ian M. Speech recognition system interactive agent
US6907387B1 (en) * 2002-08-05 2005-06-14 Bellsouth Intellectual Property Corporation Systems and methods for remote monitoring of a facility location
US20040252184A1 (en) * 2003-06-16 2004-12-16 Hesse Thomas H. Video visitation station
US20050114192A1 (en) * 2003-11-26 2005-05-26 Worldcom, Inc. Inmate visitation scheduling and management
US20050128283A1 (en) * 2003-12-16 2005-06-16 Bulriss Michael E. Video conference system providing private and attorney-client privileged communications
US20060064037A1 (en) * 2004-09-22 2006-03-23 Shalon Ventures Research, Llc Systems and methods for monitoring and modifying behavior
US7519169B1 (en) * 2004-09-28 2009-04-14 Evercom Systems, Inc. Systems and methods for management and dissemination of information from a controlled environment facility
US7256816B2 (en) * 2004-10-25 2007-08-14 3V Technologies Incorporated Systems and processes for scheduling and conducting audio/video communications
US20060087554A1 (en) * 2004-10-25 2006-04-27 Boyd Sandra L Systems and processes for scheduling and conducting audio/video communications
US20060087555A1 (en) * 2004-10-25 2006-04-27 3V Technologies Incorporated Systems and processes for scheduling and conducting audio/video communications
US20070237099A1 (en) * 2006-03-29 2007-10-11 Microsoft Corporation Decentralized architecture and protocol for voice conferencing
US7417983B2 (en) * 2006-03-29 2008-08-26 Microsoft Corporation Decentralized architecture and protocol for voice conferencing
US20080000966A1 (en) * 2006-06-30 2008-01-03 Evercom Systems, Inc. System and method for electronic visitation registration
US20080106370A1 (en) * 2006-11-02 2008-05-08 Viking Access Systems, Llc System and method for speech-recognition facilitated communication to monitor and control access to premises
US20080118045A1 (en) * 2006-11-22 2008-05-22 Evercom Sustems, Inc. Systems And Methods For Visitation Terminal User Identification
US20080201143A1 (en) * 2007-02-15 2008-08-21 Forensic Intelligence Detection Organization System and method for multi-modal audio mining of telephone conversations

Cited By (141)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10740861B1 (en) * 2003-11-24 2020-08-11 Securus Technologies, Inc. Systems and methods for acquiring, accessing, and analyzing investigative information
US9525656B2 (en) 2005-02-17 2016-12-20 Core Systems (Ni) Limited Offender message delivery system
US9077680B2 (en) 2005-02-17 2015-07-07 Core Systems (Ni) Limited Offender message delivery system
US20130002804A1 (en) * 2005-10-31 2013-01-03 At&T Corp. Method and apparatus for providing high security video session
US8836752B2 (en) * 2005-10-31 2014-09-16 At&T Intellectual Property Ii, L.P. Method and apparatus for providing high security video session
US8731934B2 (en) 2007-02-15 2014-05-20 Dsi-Iti, Llc System and method for multi-modal audio mining of telephone conversations
US8942356B2 (en) 2007-02-15 2015-01-27 Dsi-Iti, Llc System and method for three-way call detection
US11895266B2 (en) 2007-02-15 2024-02-06 Dsi-Iti, Inc. System and method for three-way call detection
US9621732B2 (en) 2007-02-15 2017-04-11 Dsi-Iti, Llc System and method for three-way call detection
US10853384B2 (en) 2007-02-15 2020-12-01 Global Tel*Link Corporation System and method for multi-modal audio mining of telephone conversations
US10120919B2 (en) 2007-02-15 2018-11-06 Global Tel*Link Corporation System and method for multi-modal audio mining of telephone conversations
US10601984B2 (en) 2007-02-15 2020-03-24 Dsi-Iti, Llc System and method for three-way call detection
US8542802B2 (en) 2007-02-15 2013-09-24 Global Tel*Link Corporation System and method for three-way call detection
US9930173B2 (en) 2007-02-15 2018-03-27 Dsi-Iti, Llc System and method for three-way call detection
US11258899B2 (en) 2007-02-15 2022-02-22 Dsi-Iti, Inc. System and method for three-way call detection
US11789966B2 (en) 2007-02-15 2023-10-17 Global Tel*Link Corporation System and method for multi-modal audio mining of telephone conversations
US9552417B2 (en) 2007-02-15 2017-01-24 Global Tel*Link Corp. System and method for multi-modal audio mining of telephone conversations
US20090233584A1 (en) * 2008-03-11 2009-09-17 Disney Enterprises, Inc. System and method for providing concierge services to a mobile device user
US20090234935A1 (en) * 2008-03-11 2009-09-17 Disney Enterprises, Inc. System and method for managing distribution of rich media content
US8472924B2 (en) 2008-03-11 2013-06-25 Disney Enterprises, Inc. System and method for providing concierge services to a mobile device user
US8745165B2 (en) 2008-03-11 2014-06-03 Disney Enterprises, Inc. System and method for managing distribution of rich media content
US20090233543A1 (en) * 2008-03-11 2009-09-17 Disney Enterprises, Inc. System and method for providing a rich media visitor log
US8428509B2 (en) * 2008-03-11 2013-04-23 Disney Enterprises, Inc. System and method for providing a rich media visitor log
US8305423B2 (en) * 2008-11-24 2012-11-06 Innovatec, S.L. Communication system for remote patient visits and clinical status monitoring
US20100128104A1 (en) * 2008-11-24 2010-05-27 Innovatec Sl Communication System for Remote Patient Visits and Clinical Status Monitoring
US8630726B2 (en) 2009-02-12 2014-01-14 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US10057398B2 (en) 2009-02-12 2018-08-21 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US9225838B2 (en) 2009-02-12 2015-12-29 Value-Added Communications, Inc. System and method for detecting three-way call circumvention attempts
US20100287251A1 (en) * 2009-05-06 2010-11-11 Futurewei Technologies, Inc. System and Method for IMS Based Collaborative Services Enabling Multimedia Application Sharing
US8458732B2 (en) * 2009-08-19 2013-06-04 Core Systems (Ni) Limited Inmate information center for correctional facility processing
US20110047473A1 (en) * 2009-08-19 2011-02-24 Core System (NI) Limited Inmate information center for correctional facility processing
US9043813B2 (en) 2009-08-19 2015-05-26 Core Systems (Ni) Limited Inmate information center for correctional facility processing
US9596247B2 (en) 2009-08-19 2017-03-14 Core Systems (Ni) Limited Inmate information center for correctional facility processing
US20110096139A1 (en) * 2009-10-22 2011-04-28 James Rudolf System and Method for Providing Secure Video Visitation
US10749457B2 (en) * 2010-01-08 2020-08-18 Tigo Energy, Inc. Systems and methods for an identification protocol between a local controller of a solar module and a master controller
US20150340983A1 (en) * 2010-01-08 2015-11-26 Tigo Energy, Inc. Systems and methods for an identification protocol between a local controller of a solar module and a master controller
US10135385B2 (en) * 2010-01-08 2018-11-20 Tigo Energy, Inc. Identification protocol between a local controller of a solar module and a master controller
US8648894B2 (en) 2011-05-04 2014-02-11 Eyconix, Llc Virtual inmate visitation
US9106789B1 (en) * 2012-01-20 2015-08-11 Tech Friends, Inc. Videoconference and video visitation security
US11856325B2 (en) 2012-02-01 2023-12-26 Homewav, Llc Inmate device and user interface for inmate initiated video visitation system
US10313632B2 (en) 2012-02-01 2019-06-04 Homewav, Llc Method and system providing inmate text-initiated web-based audio-video secured visitor visitation
US9609269B2 (en) 2012-02-01 2017-03-28 Homewav, Llc Remote web-based visitation system for prisons
US9800830B2 (en) 2012-02-01 2017-10-24 Homewav, Llc Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party
US9723262B1 (en) 2012-02-01 2017-08-01 Homewav, Llc Inmate initiated web-based audio-video visitor visitation method and system
US9094569B1 (en) * 2012-02-01 2015-07-28 Gary James Humphries Remote web-based visitation system for prisons
US9483756B2 (en) * 2012-03-30 2016-11-01 Advanced Technologies Group, Inc. Mechanism for multiple system common scheduling and analysis of unrelated events in a corrections facility
US20130262521A1 (en) * 2012-03-30 2013-10-03 Atul Gupta Mechanism for Multiple System Common Scheduling and Analysis of Unrelated Events in a Corrections Facility
US20140218466A1 (en) * 2012-12-21 2014-08-07 Tw Vending, Inc. Audio-video remote visitation telecommunications technology
US9288439B2 (en) * 2012-12-21 2016-03-15 Tw Vending, Inc. Audio-video remote visitation telecommunications technology
US9924135B1 (en) * 2013-02-11 2018-03-20 Securus Technologies, Inc. Rules-based systems and methods for video visitation
US9225935B2 (en) 2013-03-15 2015-12-29 Intelmate Llc Video communications in detention environments
US9948886B2 (en) 2013-03-15 2018-04-17 Intelmate Llc Video communications in detention environments
US9667763B1 (en) * 2013-05-20 2017-05-30 Securus Technologies, Inc. Family communications in a controlled-environment facility
US10116458B2 (en) 2013-05-20 2018-10-30 Securus Technologies, Inc. Family communications in a controlled-environment facility
US9380082B1 (en) * 2013-10-22 2016-06-28 Securus Technologies, Inc. Remote multi-party and/or event-driven visitation for residents of controlled-environment facilities
US10713743B1 (en) 2013-11-01 2020-07-14 Securus Technologies, Inc. Management of visitation sessions for residents of controlled-environment facilities
US9007420B1 (en) * 2014-01-10 2015-04-14 Securus Technologies, Inc. Verifying presence of authorized persons during an electronic visitation
US10296784B2 (en) 2014-01-10 2019-05-21 Securus Technologies, Inc. Verifying presence of a person during an electronic visitation
US11201899B1 (en) * 2015-09-02 2021-12-14 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US11757958B1 (en) 2015-09-02 2023-09-12 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US9979760B1 (en) * 2015-09-02 2018-05-22 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US9723040B1 (en) * 2015-09-02 2017-08-01 Confinement Telephony Technology, Llc Systems and methods for secure, controlled virtual visitation with confinement institution inmates
US9820150B2 (en) 2015-09-25 2017-11-14 Harris Corporation Managed access system having filtered communications using network interface device
US9769666B2 (en) 2015-09-25 2017-09-19 Harris Corporation Managed access system with monitoring device to determine and change radio equipment
US9763095B2 (en) 2015-09-25 2017-09-12 Harris Corporation Managed access system that determines authorized and unauthorized mobile wireless devices
US9584252B1 (en) 2015-09-25 2017-02-28 Harris Corporation Managed access system with mobile wireless device geolocation capability
US9736706B2 (en) 2015-09-25 2017-08-15 Harris Corporation Managed access system with monitoring device to determine system operability
US10321094B2 (en) 2016-01-20 2019-06-11 Global Tel*Link Corporation Secure video visitation system
US11405583B2 (en) 2016-01-20 2022-08-02 Global Tel*Link Corporation Secure video visitation system
US11838685B2 (en) 2016-01-20 2023-12-05 Global Tel*Link Corporation Secure video visitation system
US10897596B2 (en) 2016-01-20 2021-01-19 Global Tel*Link Corporation Secure video visitation system
US10853901B2 (en) * 2016-02-11 2020-12-01 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US20230025565A1 (en) * 2016-02-11 2023-01-26 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US11854105B2 (en) * 2016-02-11 2023-12-26 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US20190272610A1 (en) * 2016-02-11 2019-09-05 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US10296994B2 (en) * 2016-02-11 2019-05-21 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US11334958B2 (en) * 2016-02-11 2022-05-17 Global Tel*Link Corporation System and method for visitation management in a controlled environment
US10270777B2 (en) 2016-03-15 2019-04-23 Global Tel*Link Corporation Controlled environment secure media streaming system
US11238553B2 (en) 2016-03-15 2022-02-01 Global Tel*Link Corporation Detection and prevention of inmate to inmate message relay
US9930042B2 (en) 2016-03-15 2018-03-27 Global Tel*Link Corporation Controlled environment secure media streaming system
US10673856B2 (en) 2016-03-15 2020-06-02 Global Tel*Link Corporation Controlled environment secure media streaming system
US11640644B2 (en) 2016-03-15 2023-05-02 Global Tel* Link Corporation Detection and prevention of inmate to inmate message relay
US10572961B2 (en) 2016-03-15 2020-02-25 Global Tel*Link Corporation Detection and prevention of inmate to inmate message relay
US10225518B2 (en) * 2016-03-23 2019-03-05 Global Tel*Link Corporation Secure nonscheduled video visitation system
US9774826B1 (en) 2016-03-23 2017-09-26 Global Tel*Link Corporation Secure nonscheduled video visitation system
US10979670B2 (en) 2016-03-23 2021-04-13 Global Tel*Link Corporation Secure nonscheduled video visitation system
US11528450B2 (en) 2016-03-23 2022-12-13 Global Tel*Link Corporation Secure nonscheduled video visitation system
US9558523B1 (en) * 2016-03-23 2017-01-31 Global Tel* Link Corp. Secure nonscheduled video visitation system
US9615060B1 (en) 2016-03-23 2017-04-04 Global Tel*Link Corp. Secure nonscheduled video visitation system
US11843901B2 (en) * 2016-03-23 2023-12-12 Global Tel*Link Corporation Secure nonscheduled video visitation system
US20230179741A1 (en) * 2016-03-23 2023-06-08 Global Tel*Link Corporation Secure nonscheduled video visitation system
US20180077387A1 (en) * 2016-03-23 2018-03-15 Global Tel*Link Corporation Secure Nonscheduled Video Visitation System
US9923936B2 (en) 2016-04-07 2018-03-20 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US20190253464A1 (en) * 2016-04-07 2019-08-15 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US11271976B2 (en) 2016-04-07 2022-03-08 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US10715565B2 (en) * 2016-04-07 2020-07-14 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US10277640B2 (en) 2016-04-07 2019-04-30 Global Tel*Link Corporation System and method for third party monitoring of voice and video calls
US11202120B2 (en) 2016-05-06 2021-12-14 Global Tel*Link Corporation Controlled environment media and communication system
US10182254B2 (en) 2016-05-06 2019-01-15 Global Tel*Link Corporation Controlled environment media and communication system
US11871073B2 (en) * 2016-05-06 2024-01-09 Global Tel*Link Corporation Controlled environment media and communication system
US9973810B2 (en) 2016-05-06 2018-05-15 Global Tel*Link Corp. Controlled environment media and communication system
US20220174349A1 (en) * 2016-05-06 2022-06-02 Global Tel*Link Corporation Controlled environment media and communication system
US9681360B1 (en) * 2016-05-13 2017-06-13 Harris Corporation Managed access system that provides selective communications and registration of mobile wireless devices
US10284559B2 (en) 2016-05-13 2019-05-07 Harris Corporation Managed access system with security assessment equipment
CN105933868A (en) * 2016-06-27 2016-09-07 合肥指南针电子科技有限责任公司 Prison break prevention system for supervision
US11611721B2 (en) 2016-10-27 2023-03-21 Chris Talbot Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility
US10405184B2 (en) 2017-01-31 2019-09-03 Harris Corporation Mobile wireless device managed access system providing enhanced authentication features and related methods
US10027797B1 (en) 2017-05-10 2018-07-17 Global Tel*Link Corporation Alarm control for inmate call monitoring
US10601982B2 (en) 2017-05-18 2020-03-24 Global Tel*Link Corporation Third party monitoring of activity within a monitoring platform
US11563845B2 (en) 2017-05-18 2023-01-24 Global Tel*Link Corporation Third party monitoring of activity within a monitoring platform
US11044361B2 (en) 2017-05-18 2021-06-22 Global Tel*Link Corporation Third party monitoring of activity within a monitoring platform
US10225396B2 (en) 2017-05-18 2019-03-05 Global Tel*Link Corporation Third party monitoring of a activity within a monitoring platform
US11526658B2 (en) 2017-06-01 2022-12-13 Global Tel*Link Corporation System and method for analyzing and investigating communication data from a controlled environment
US10860786B2 (en) 2017-06-01 2020-12-08 Global Tel*Link Corporation System and method for analyzing and investigating communication data from a controlled environment
US10896622B2 (en) 2017-06-20 2021-01-19 Global Tel*Link Corporation Educational content delivery system for controlled environments
US11699354B2 (en) 2017-06-20 2023-07-11 Global Tel*Link Corporation Educational content delivery system for controlled environments
US11757969B2 (en) 2017-06-22 2023-09-12 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call
US10693934B2 (en) 2017-06-22 2020-06-23 Global Tel*Link Corporation Utilizing VoIP coded negotiation during a controlled environment call
US9930088B1 (en) 2017-06-22 2018-03-27 Global Tel*Link Corporation Utilizing VoIP codec negotiation during a controlled environment call
US11381623B2 (en) 2017-06-22 2022-07-05 Global Tel*Link Gorporation Utilizing VoIP coded negotiation during a controlled environment call
US10171680B1 (en) * 2017-06-30 2019-01-01 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US11349998B2 (en) 2017-06-30 2022-05-31 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US10757268B2 (en) 2017-06-30 2020-08-25 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US11750746B2 (en) 2017-06-30 2023-09-05 Global Tel*Link Corporation Call processing system for modifying inmate communication limits
US11829955B2 (en) 2017-07-20 2023-11-28 Global Tel*Link Corporation System and method for providing job-specific training and employment to residents of a controlled environment facility
US10699810B2 (en) * 2017-07-20 2020-06-30 Kenneth W. STEWART Employee visit verification system
US11164151B2 (en) 2017-07-20 2021-11-02 Global Tel*Link Corporation System and method for providing job-specific training and employment to residents of a controlled environment facility
US11108885B2 (en) 2017-07-27 2021-08-31 Global Tel*Link Corporation Systems and methods for providing a visual content gallery within a controlled environment
US10405007B2 (en) 2017-07-27 2019-09-03 Global Tel*Link Corporation Systems and methods for a video sharing service within controlled environments
US11750723B2 (en) 2017-07-27 2023-09-05 Global Tel*Link Corporation Systems and methods for providing a visual content gallery within a controlled environment
US11595701B2 (en) 2017-07-27 2023-02-28 Global Tel*Link Corporation Systems and methods for a video sharing service within controlled environments
US10516918B2 (en) 2017-07-27 2019-12-24 Global Tel*Link Corporation System and method for audio visual content creation and publishing within a controlled environment
US10122825B1 (en) 2017-07-27 2018-11-06 Global Tel*Link Corporation Systems and methods for providing a visual content gallery within a controlled environment
US10015546B1 (en) 2017-07-27 2018-07-03 Global Tel*Link Corp. System and method for audio visual content creation and publishing within a controlled environment
US11115716B2 (en) 2017-07-27 2021-09-07 Global Tel*Link Corporation System and method for audio visual content creation and publishing within a controlled environment
US10565247B2 (en) 2017-07-28 2020-02-18 Global Tel*Link Corporation Controlled environment secure media streaming system with digital video recording
US11213754B2 (en) 2017-08-10 2022-01-04 Global Tel*Link Corporation Video game center for a controlled environment facility
US10609089B1 (en) * 2017-12-20 2020-03-31 Securus Technologies, Inc. Influencing the location of contraband wireless communications devices within controlled-environment facilities
US10929940B1 (en) * 2018-03-02 2021-02-23 Securus Technologies, Llc Controlled-environment facility message response system
US10929941B1 (en) * 2019-03-21 2021-02-23 Securus Technologies, Llc Controlled incarceration risk mitigation mechanisms for at risk constituents employing controlled-environment facility communications systems
US20220272131A1 (en) * 2020-09-04 2022-08-25 Puzzle Ai Co., Ltd. Method, electronic device and system for generating record of telemedicine service

Also Published As

Publication number Publication date
US11789966B2 (en) 2023-10-17
US10120919B2 (en) 2018-11-06
US10853384B2 (en) 2020-12-01
US20140254777A1 (en) 2014-09-11
US9552417B2 (en) 2017-01-24
US20170147662A1 (en) 2017-05-25
US20240054142A1 (en) 2024-02-15
US8731934B2 (en) 2014-05-20
US20080201143A1 (en) 2008-08-21
US20180260455A1 (en) 2018-09-13
US20210149911A1 (en) 2021-05-20

Similar Documents

Publication Publication Date Title
US20080201158A1 (en) System and method for visitation management in a controlled-access environment
US10032066B2 (en) Secure communication systems and methods
US11271976B2 (en) System and method for third party monitoring of voice and video calls
US10003663B2 (en) Inmate network priming
CA2774622C (en) Interactive audio/video system and device for use in a secure facility
US20160191484A1 (en) Secure Inmate Digital Storage
US10853901B2 (en) System and method for visitation management in a controlled environment
US11956383B2 (en) Systems and methods for blockchain wireless services in a controlled environment
US11363135B2 (en) System and method for communicating with inmates in a privileged communication
CA2845843A1 (en) Secure communication systems and methods

Legal Events

Date Code Title Description
AS Assignment

Owner name: INMATE TELEPHONE, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JOHNSON, MARK D.;ROKOSKY, JAMES P.;DOM, JOSHUA;AND OTHERS;REEL/FRAME:020738/0140

Effective date: 20080401

AS Assignment

Owner name: DSI-ITI, LLC,ALABAMA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ITI INMATE TELEPHONE, INC.;REEL/FRAME:024539/0775

Effective date: 20100614

Owner name: DSI-ITI, LLC, ALABAMA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ITI INMATE TELEPHONE, INC.;REEL/FRAME:024539/0775

Effective date: 20100614

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS,NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:DSI-ITI, LLC;REEL/FRAME:024626/0512

Effective date: 20100616

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS, NEW YORK

Free format text: SECURITY AGREEMENT;ASSIGNOR:DSI-ITI, LLC;REEL/FRAME:024626/0512

Effective date: 20100616

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, LLC;REEL/FRAME:025990/0257

Effective date: 20101110

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, LLC;REEL/FRAME:025990/0304

Effective date: 20101110

Owner name: DSI-ITI, LLC, ALABAMA

Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:025990/0250

Effective date: 20101110

AS Assignment

Owner name: GLOBAL TEL*LINK CORPORATION, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431

Effective date: 20111214

Owner name: DSI-ITI, LLC, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431

Effective date: 20111214

Owner name: VALUE-ADDED COMMUNICATIONS, INC., ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431

Effective date: 20111214

Owner name: 3V TECHNOLOGIES INCORPORATED, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431

Effective date: 20111214

AS Assignment

Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:027489/0073

Effective date: 20111214

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: GLOBAL TEL*LINK CORPORATION, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276

Effective date: 20130523

Owner name: DSI-ITI, LLC, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276

Effective date: 20130523

Owner name: 3V TECHNOLOGIES INCORPORATED, ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276

Effective date: 20130523

Owner name: VALUE-ADDED COMMUNICATIONS, INC., ALABAMA

Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276

Effective date: 20130523

AS Assignment

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: PATENT SECURITY AGREEMENT (SECOND LIEN);ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:031345/0243

Effective date: 20130523

Owner name: CREDIT SUISSE AG, NEW YORK

Free format text: PATENT SECURITY AGREEMENT (FIRST LIEN);ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:031344/0776

Effective date: 20130523