`
`(12)
`
`United States Patent
`Hodge
`
`(10) Patent N0.:
`(45) Date of Patent:
`
`US 7,333,798 B2
`Feb. 19, 2008
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`75
`(
`)
`
`_
`Inventor‘ Stephen Lee Hodge’ Aubrey’ TX (Us)
`
`7/1999 Baker et a1. ......... .. 379/26502
`5,923,746 A *
`8/1999 Richardson et a1.
`379/88.26
`5,943,403 A *
`7/2000 Kennedy e161. .......... .. 380/247
`6,084,967 A *
`8/2000 Baumann
`455/410
`6,104,922 A *
`6,182,221 B1* 1/2001 Hsu et a1.
`713/186
`6,213,391 B1 *
`4/2001 Lewis
`235/380
`
`.
`.
`.
`(73) Asslgnee: Value Added commumcatlons’ Inc"
`Plano’ TX (Us)
`
`6,219,439 B1* 4/2001 B
`6,282,566 Bl* 8/2001 Leggstral. ....... ..
`6,377,699 Bl* 4/2002 Musgrave e161.
`
`382/115
`709/217
`382/117
`
`*
`
`_
`) Nome?
`
`(
`
`_
`_
`_
`_
`SubJect to any (1150121111169 the term Ofthls
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 442 days.
`
`(21) Appl. NO.Z 10/215,367
`
`(22) Filed;
`
`Aug 8, 2002
`
`(65)
`
`Prior Publication Data
`
`US 2004/0029564 A1
`
`Feb. 12, 2004
`
`(51) Int. Cl.
`(2006.01)
`H04Q 7/20
`(52) us. Cl. ................. .. 455/411;455/410;379/93.02;
`379/14205
`(58) Field of Classi?cation Search .............. .. 455/410,
`455/411, 563, 405, 406, 555, 560, 414.1,
`455/445, 55; 379/ 88.19, 8802, 114-03, 265-01,
`379/ 142.1, 142.2, 142.05, 142.06, 93.02;
`726/5; 713/169, 202; 380/247; 235/379
`See application ?le for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`
`i i
`
`’
`’
`5,485,507 A *
`5,502,759 A *
`
`greePd
`arm ge’
`1/1996 Brown et a1.
`3/1996 Cheng e161.
`
`"""""" " 37495/
`"
`
`.. 379/8808
`.. 379/8802
`
`5,655,013 A *
`
`8/1997 Gainsboro . . . . . .
`
`. . . .. 379/188
`
`5,717,743 A *
`
`2/1998 McMahan et a1. ........ .. 379/188
`
`6,389,397 B1 *
`5/2002 Otto ...................... .. 704/270
`6,668,045 Bl* 12/2003 Mow ....... ..
`379/8819
`6,687,733 B2 *
`2/2004 Manukyan .
`..... .. 709/200
`6,819,219 Bl* 11/2004 Bolle e161. .............. .. 340/552
`6,836,556 B1* 12/2004 Bromba et a1. ........... .. 382/124
`6,950,508 B1* 9/2005 Grii?ths ......... ..
`.. 379/201.01
`2002/0042879 A1* 4/2002 Gould et a1.
`.... .. 713/176
`2002/0177433 Al* 11/2002 Bravo e161. .............. .. 455/411
`
`FOREIGN PATENT DOCUMENTS
`2 148 569 A * 5/1985
`
`GB
`
`* cited by examiner
`.
`.
`.
`Przmar Exammerilean Gelm
`.
`y
`_
`(74)’4’wmey’Agw” "r Flrmiward‘g‘ Ohvo
`(57)
`ABSTRACT
`
`A secure telephone call management system is provided for
`authenticating users of a telephone system in an institutional
`facility. Authentication of the users of the telephone call
`management system is accomplished by using a personal
`identi?cation number, biometric means, and/or radio fre
`quency means. The secure telephone call management sys
`tem includes accounting software capable of limiting access
`to the system based on funds in a user’s account or other
`related limitations. The system includes management soft
`Ware capable of implementing Widespread or local changes
`to the system and is further capable of modifying or setting
`b
`f
`t
`t
`any Hum er 0 user accoun Parame ers'
`
`5 Claims, 36 Drawing Sheets
`
`Trunk Lines
`
`<—111
`
`“)5
`Electronic
`\ Switchboard
`Device
`
`Audio
`“7* Recorder
`
`I
`“Sgseml
`/
`Serial
`
`Central
`Site Server
`T
`
`i
`l
`Y
`Biometric @Lf?ill RF Transmitter
`
`113
`
`109
`
`107
`
`108
`
`101 /'
`
`Admin.
`
`4120
`
`Workstation
`
`Shadow
`Workstation
`
`+123
`
`.
`.
`Investigatwe <_
`Workstation
`‘25
`
`CMS (WAN)
`
`GTL 1005
`IPR of U.S. Pat. No. 8,340,260
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 1 of 36
`
`US 7,333,798 B2
`
`o~fi|V
`
`.E:6<
`
`:o_§$:o>>
`
`Bowmsm
`
`coufimvcog
`
`u>umwumu>£
`
`coufimvtog
`
`_«.::oU
`
`hrcomozm
`
`we
`
`:71?mocfi
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 2 0f 36
`
`US 7,333,798 B2
`
`
`
`DMU Alllmmw
`
`
`
`V/QN TFUA
`
`k F 3‘ EN M8
`
`020 0%! Eu; 5 mUQ
`
`mHQ /
`UHF TEN ‘A _
`>\:~ ) ea /
`
`mmU :N
`
`
`
`62-09 0.6 “Era Iuwu
`
`2a SN Ely. u: Em
`
`_ mom
`2: %
`
`+ >\
`
`zzé 1'
`56E n2 Ema
`
`
`
`
`
` mam P RN Almom
`
`_ 5m \ 88>
`
`@325
`
`mi Ma
`
`N .U?m
`
`:_ _
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 3 of 36
`
`US 7,333,798 B2
`
`ham
`
`umu
`
`CmIIV
`
`><mm<
`
`m:
`
`.nzm
`
`.>mm
`
`.MQD<
`
`HQOUHQ
`
`Mmmzomm
`
`xz<m
`
`mu:
`
`aom
`
`k\\Q
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 4 0f 36
`
`US 7,333,798 B2
`
`.UOME
`
`HZOH
`
`HQOUEQ
`
`2cm
`
`25¢
`
`mow k @omb
`
`Fmw
`
`ZTMQZTP
`
`mmw
`
`‘I 5
`
`wow wow
`
`
`
`.2200 I4 @785
`
`All h;
`
`
`
`pi; mow
`
`0%
`U
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 5 of 36
`
`US 7,333,798 B2
`
`oafizoa
`
`mmzzfivm
`
`UO..—<Z<E
`
`UhOHmemo»
`
`Sm
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 6 0f 36
`
`US 7,333,798 B2
`
`0mm |' Min
`
`F ME
`
`w .Uwm
`
`Em
`
`m8 $53
`
`35200
`
`" wmam m
`
`
`@ @ wmDm
`.oizou ‘ - $2.122:
`
`53722 2.2 @EEw
`
`new
`
`hwi
`
`m2
`
`M5350”;
`qomhzou as
`
`Sm
`
`\
`
`wwam
`
`mow
`
`\ VEQBEZ
`HV F
`ZHmm
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 7 0f 36
`
`US 7,333,798 B2
`
`mow \ll'
`
`
`
`HMOm 03H.
`
`Min +
`
`mow
`
`.
`
`N
`
`
`
`E502 MES
`
`$5502
`
`5“ - Sou 12mm
`
`
`which
`
`DOG
`
`.06”:
`
`SEE
`
`20%
`
`in
`
`P95 3
`
`II_
`
`In
`
`:00
`
`tn
`
`
`
`W55» Sou
`
`we“
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 8 of 36
`
`US 7,333,798 B2
`
`_Mmv.UOm..._
`
`mu_o>
`
`mutkm
`
`am“:
`
`><mm<
`
`vwmw
`
`bfiommmomuAIma.
`
`..............................................................................................................................................................................................................................................................................................................................................................................................................................................
`
`mmmmomoimCw
`
`
`
`JOMHZOUw—<UOw_
`
`mmmm
`
`!.m5<.—.<Q
`
`
`
`.UOMmmVH95NVKOSWE
`
`255
`
`e52.52
`
`cm:
`
`3%
`
`aGE
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 9 0f 36
`
`US 7,333,798 B2
`
`Rom 1|‘ PMAwD
`
`_ 2552
`/
`@oo
`
`20
`
`wmxuiram
`
`
`
`MAD HEHH
`
`, 03H
`
`E15 Q Eon
`
`So I"
`
`
`
`Sou ‘Zn-mm
`
`which
`
`NJUM
`
`:0
`
`so.
`
`00w
`
`m5
`
`PMOMEOU
`
`OED
`
`mom
`
`605
`
`2E2
`
`2oz
`
`E3
`|_
`
`1:63
`
`155200
`
`wmam
`
`@ .UE
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 10 0f 36
`
`US 7,333,798 B2
`
`S2 1/
`
`coo“
`
`H 2:
`
`moi
`
`moi
`
`:2
`
`m2:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 11 0f 36
`
`US 7,333,798 B2
`
`mo:
`
`5:
`
`we:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 12 of 36
`
`US 7,333,798 B2
`
`[\
`
`E
`
`SS/asQ282
`
`L{|Ilr.1..:l.|I.I.»I.§.|.telIL.ru..|.Lv.rI.Il»sIl:nI.Il.!r|I:...‘a1.¢|l..II
`
`
`
`
`
`
`
`
`m.u__m3Ez._“m.n.I.2_::.v.....:.mm_§_.mm:mmx..w.u.3
`
`Nu.U~,m
`
`a..
`
`«..r.rs..4W:.........4xiw_$."$wm,§.$.Efiw#.M.u,
`
`
`
`...:.J..v-31a._:..1(....li.u:.s:1...
`_..En._.3»ma?QMEQ
`
`
`
`Iii:E.+.,..i............$.:...,..E...$.\.:.:§..,......:5..1..1...r;..:..<.:é..:......?.s..5...e!..b..r,....§!..:.31.Ex£2333m.53EB_
`
`
`
`.,.a...3T3...,.:..:..2....:...u...:..Is......l...I1|vlII|..r.o...._)....l..l..i.¢....£\an1Ii...
`
`
`
`
`..........nL.l.rI.I.!I.!..l.l.a1i|vu1.-.-.LI|Lan......|n'....zwIrxIL.orI.Ir|.I....l...I.I.lrI.l_r-!l..\!l.r1asE:mfig.3988
`
`
`
`gamma“ufifimsmsfiafi
`
`._.£1131.1:2i.i:.,..,..i..ir.33.......
`
`
`
`..I:.r1..T1;u.i.II..u..lJ|71...I4|lr.|l|fp.|l|l||I|I.l.|.ul|.I.
`
`
`
`
`...1.1.$1.11.Vn..._.1I.»..1111,.a.|rniI.l‘..1.:r..:ul(uJ1I.zdI(l1$Iln...(.}i)..
`anmm?3Hmmm
`
`#616£53
`
`
`
`
`
`.|.....E1v.Y:IIu..k_llI|Ifr[I'I|f
`finwa.88
`
`
`
`T|.E.II.i.III
`
`_.hc.es~.‘~15
`
`‘ .' .v'::‘-;-:~‘,=r.’.':+.“g_.‘,*=::-.'~v!,-:-«A
`
`
`
`
`
`.1...I1|.I........i.1.ll.l|.1In1..|.rIu.I.-lilnii.
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 13 0f 36
`
`US 7,333,798 B2
`
`Q02
`
`22
`
`2 .UHH
`
`:2
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 14 0f 36
`
`US 7,333,798 B2
`
`w T1 m2;
`
`hymn-“331.05 uni
`
`
`
`
`
`(Lani-r 15!: ii;
`
`No:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 15 0f 36
`
`US 7,333,798 B2
`
`.n
`
`Mn.» .
`
`£2 a“ 3 w
`
`.w}. ‘M
`
`.
`
`
`
`m‘ , . Q2 .
`
`q .
`
`.
`
`:2 in .w 7 u. 1
`
`$2 ,. 3
`
`$2 .
`
`_ 3
`
`q.
`
`
`
`3. pr X _
`
`.
`
`_. , , M F 3 w
`
`w s. . .. 3
`
`22 .3 . i ???m
`
`
`
`, _ E. s .3
`
`
`
` . .G q 33.. 3...
`
`
`
`
`
`
`
`. all 11:012. ii
`
`.gmg?
`
`
`
`. Ur ml‘ ,mtlialllla vvlfai‘lvnlill
`
`
`
`
`
`22 Q: :2
`
`mo:
`
`mo:
`
`002
`
`
`
`In; .UFH
`
`a2
`
`om:
`
`m8 @315
`
`mo:
`
`52
`
`\ m5
`
`/ 82
`
`/ mm:
`
`5.2
`
`mm:
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 16 of 36
`
`US 7,333,798 B2
`
`88
`
`:2i.l...I...+115RE
`
`
`82cocaoo©_
`
`
`
`
`
`.,..,...,.__mm.=umo=c£_m__3,,.,m_.,_,....,
`
`«char.a.-:mw.,..1%».23»smmmamwm
`
`
`.
`
`«Pr.nu}.oz.33
`
`
`
`32
`
`22
`
`:2
`
`:2
`
`
`
`..;:.,;m\.,1,,,.,mm,,.:w_,,,,.,:....L3.,N_m@.mfi.s-
`
`
`
`
`
`Edam
`
`
`
`.1sim.H,....-..,.£13:.....3}mfiamsa
`,wo..>,....m.,,>..,._.,_<,,u:m$a§.wm
`
`
`
`
`
`3.,-ab.2,;-..:m.._cm~:mm§m
`
`
`we,at....3.:8o5E.2m,
`
`
`
`
`
`
`
`,,,,.,3am..¢:.,-1a,..--.w,E§,fimm-_Iis
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 17 0f 36
`
`US 7,333,798 B2
`
`@gg Hg
`
`w x $4
`
`2: :: mo: no: mo: mo: 5: /
`
`3w 5: i E
`
`ti
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 18 0f 36
`
`US 7,333,798 B2
`
`w 2, 5m»
`
`n
`
`Ewgmzm N:
`
`2 .UFH
`
`
`
`2M: 5: :M: :2 32: SE 8M: % 2: 52
`
`
`
`
`
`8M:
`
`girl-Iii:
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 19 0f 36
`
`US 7,333,798 B2
`
`w
`
`
`
`v3.2.5.) 1!!
`
`moi
`
`002
`
`S9
`
`a .UE
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 20 of 36
`
`Us 7,333,798 B2
`
`3.UHm
`
`mmommmom
`
`mam:833
`
`mvfifiznmIw
`
`moon
`
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 21 of 36
`
`US 7,333,798 B2
`
`c_.nEou.EufiEE3B:2mwmuaoRoamEraaoauac._.m_:m,
`
`
`
`w=_nEuu_ca_Bo__n.E>.._o5m£n_5.EsaoongfinéammbafimgoEn
`
`
`
`
`
`
`
`men8:v/
`
`oofi
`
`a§.€.£u<_
`
`55
`
`:_uEu§m._aEBms_mfi_cE.no2.3:3EmnsmfiI
`
`
`
`3%sszemwmgamm
`
`C3393
`
`waéwEm
`
`
`
`
`
`&nEau._..m5uEouR59«$89.3_.aamfiflm995£330.
`
`
`
`
`
`Emma:m9EonmiEmu:E05604.H
`
`
`
`
`
`
`
`flmmam_._.3Eni5.33:0:._oEan_..,.
`
`
`
`
`
`
`
`
`
`3%asxuun_ut.£_..omm.2:mmnaxa:8£mnEm_2€90.30magnumwt.
`
`
`_.aE%2:”.mfigfisfiEucmamo
`
`Sa
`
`88
`
`:8
`
`m:N
`
`Em
`
`E.U~,m
`
`...iu..KnIm..‘Il.;‘._.i..KmfiN,i.........:IJm!,..>.l.un.uwafiiistrumbnmmnmufflmfin.L....rgmwnwuth.$m.¢2...1r.§..«t:.1Lav.r....§_.n4~i.u.fi€.e..r.?f.r..E....Lrv.tup..ww..
`
`
`
`
`mmmw:mfinmmmom..5aJa<.:w.:3,..
`
`
`
`
`
`
`
`§umnmm_E_..
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 22 of 36
`
`US 7,333,798 B2
`
`
`
`mommM........._H.,.
`
`
`
`as X3...um§.aEE_.A2.335.25%3EQ“_ 33
`
`
`
`
`
` 33aaaéfizfiaémma
`.3A 3mfimfi_¢n_._.a__.flu
`
`
`
`3.U~m
`
`umI
`kw».
`
`Wwu2§m=,_3
`
`,
`
`._
`
`as
`1.1
`i.1
`
`SS
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 23 of 36
`
`US 7,333,798 B2
`
`comm
`
`Hmmm
`
`Mommm_mmn_mN
`
`lEI.I~I.lyIuaoki|.....vI»21.x
`.341.35.;
`_mz_..fiq3.%..
`
`1
`
`
`
`.,,__.E.%4V
`
`88%
`
`hommmfimm
`
`.8.UHm
`
`
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 24 of 36
`
`US 7,333,798 B2
`
`mfivm
`
`Hmwm
`
`mmvm
`
`..
`
`.
`
`Ea..a$..wag..
`
`ooqm
`
`mmwm
`
`m_¢m
`
`_m¢m
`
`mmwm
`
`NNVNé
`.ma~.nmwg$u_
`
`3film
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 25 of 36
`
`US 7,333,798 B2
`
`,Q.£.._q3¢§
`
`rd5.14.......
`
`
`
`
`
`...~»..n..»,mw.a.nw;,.
`
`mm.UHm
`
`.
`
`
`
`
`
`
`.|l...t!.....,....X.ts.l...>r...r..S+t..T.}..l;.....i.liR..3......i.£:Sziirl.:rs...I.!.r....,........r..s.......sz....!...:..31.3t....-l..ve..!ll..marmm8.5%Emfi
`
`
`
`.,|......»..Iz£...li.t!\!..l...:n..|...¥r..|.lIIr\.iz..ime.....v2.:...Il|aI!o.....2.31.3.1.1.!l.u}x.\<..1>t3lrfil......a....l.......|..§_.........s1......IC...!I.._;..I..t...\..E?.3mmm.._.n......»W
`
`
`
`
`
`
`
`
`3MNfi.m$§_.
`
`
`
`.li!.I..-_..............i.a!.1s.s....5i.:._..1.!Iaiiz€...i¢.x5ii:.?.1.4:sTi1|tlI1.
`..,s...,Lm-iE.--:iiaz.-s--,,_.%..-.Ezéti.L.
`
`.Is.l+|:.n_!u!..!..;.....i...z;s4.«1..u.....:.z<I.....§..:!:..oI.3..I..!2:{..<7.1..
`
`mm-§_..m:Enmfia».
`
`.E.§k..Mafia.
`
`
`
`.m§:$;
`
`.
`
`éfi3.3%,?Rafi.
`
`
`.,....sIl.lIIrInmi.In.tI.IlIn!lI.ll..1.zrl¢u:x..l..t.l..,iwl!.!l.\..._........l.r:.xI.s::-....:......sl..!§..{\:¢uauixI1.s1.I..r:...I.1E3..
`iktltiul,11..rL.P..Lil.i,LIL>.«l..\..I....‘.E._.1I,'1'Alu\I'}u'I‘4‘X.:M8?Lm.$_.E_.._a.ESE
`
`
`
`E?mm.§._&_Emmmfi_..
`
`
`
`
`
`
`..-Tbrrrilrvllutltb.....::5\.....».....1.1.:L.3.‘faYv(J.1..11E.»..2......$I.1..l..v.V»!I|.lix...!..|r:!.rc$k.inI!.l.E..._..t:!1.51.1.4:
`
`
`s..e.$I&...Esa..iIlI.7..,.+a!..:.....1......:...,..........,.:2....za:.!:..i..;zii.......s..3s.3....
`3%?H$_....Ea83.33.
`DE.Mmmuwfiw3%...«.1}.!t:}1.a.z.\1I..4
`
`
`,II|:s!IzvL¥|nIn£t.I...l|..x.......raL.....!.._.xZ>....:;.-r§.(r.r..r..:....).I.r......!l.s.L.I...ESL;.151.5.5.1:.
`E2.WmBdma,8.8%.;
`
`
`
`:§.I.J:..ti1...1.:.r............i.,:.a!3...:I1:;:..A1....:.r3.}:.T..:.zL:£....i.r;sEb.
`.?c.}..%--...::L;IL§¢.-1r,§E2..§:.E..:Eii:_ir...::.z.r.-
`
`82
`
`
`
`
`U.S. Patent
`
`M
`
`S
`
`6
`
`US 7,333,798 B2
`
`
`
`
`
`..... m.3L,3.,_....u...fi,».“_.M...u..{.3_;n.._~.m..3FV.u.
`
`
`
`
`
`
`
`
`aan.33.5.53833m.
`
`m3n_%.§_m-33.3A,3,...mma;m..-.~%zcEmw.-.L-;._.m_aL.w..-
`
`wW.
`
`..'....--.'us‘~‘r-~M,'A.
`
`
`
` 8..3353.9Ram“
`
`_,
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 27 of 36
`
`US 7,333,798 B2
`
`.—...._.,...._r( .—_.v.
`‘Hit V...
`.
`.» ‘ aria-Lv-44.34.‘.
`
`..
`
`fin.
`
`ha.05
`
`88SR
`
`«sun»
`
` .4...w.w..
`
`
`
` ‘ "’-‘. ..-ac-'-1;‘ ~ . ‘
`__ _I_- ‘___,.-..,_ ,’- ;',;..v_".4..‘;,»
`
`.LT:'~’.n
`
`
`
`
`
`U.S. Patent
`
`eF
`
`00002on1
`
`LI.6e_h__S
`
`63f0
`
`US 7,333,798 B2
`
`mu.U~m
`
`ommm
`
`mmmmwm
`
`km_NwN
`
`E
`
`E
`
`8 f
`
`i
`
`momm
`
`comm
`
`>—wN
`
`oflwm
`
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 29 of 36
`
`US 7,333,798 B2
`
`2929
`
`2921
`
`2901
`
`2900
`
`FIG.29
`
`[\
`C
`O\
`(\l
`
`O\
`G
`O‘
`(\I
`
`2903
`
`2919
`
`2923
`
`
`
`U.S. Patent
`
`mu
`
`mw0
`
`MM
`
`fl.003H
`
`US 7,333,798 B2
`
`Fp\
`
`
`
`_wnmomRom
`
`owBoom
`
`e_fiom
`
`umficm
`
`cm.05
`
`Hoom
`
`moom
`
`moom
`
`ooom
`
`mflom
`
`nflom
`
`
`
`m.__._:uQ=muIAIIIooom
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 31 of 36
`
`US 7,333,798 B2
`
`
`
`.3.:___.~.?.m.m:u.\wE>Sn_.Em.
`
`
`
`
`
`
`
`-832:2::54/8:
`
`2.05
`
`:2R:
`
`8:
`
`8:
`
`8:
`
`E:
`
`SF.
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 32 of 36
`
`US 7,333,798 B2
`
`umdumb
`
`QDDD
`
`nmam
`
`upon
`
`muom
`
`moqqua
`
`ammhuuzuhmua
`uwuomomo
`
`zngmz4mm
`vvvomoma
`
`MAHAAHEA
`aoaommmo
`
`qmomqqas
`woaommmo
`
`«manna
`nmmomomo
`
`nqapoum
`moaommmo
`
`xoou
`noaommmo
`
`moaommmo
`
`moaommma
`
`1;
`
`comm
`
`
`
`
`U.S. Patent
`
`Feb. 19,2008
`
`Sheet 33 of 36
`
`US 7,333,798 B2
`
`I
`-1
`
`I
`II
`-I-iv-:1-—I--Iv-1-I-4-I-I-l--Iv-4-(v-I--4
`
`‘M.....W.,u.,...w.ue..hw
`
`
`
`
`u.‘u..,x.1.:.fl.1.7_\.RW..nu».‘_1‘.‘H....:onisH.3»23.
`
`:382S282mommSm
`
`
`
`A240mamammmmmoauumnwuummooooaxoaxaammmomomo
`
`
`
`
`
`
`
`
`
`AE4Uoouommmmmomwnmmqnnvnoaooouxmaxuqaoaommmo
`
`
`
`
`
`
`
`AflfluoouoNmmmmommnmmonwmuvaooouxmaxuaHoaommmo
`
`
`
`
`
`
`
`
`
`
`
`A240oouooaonmmmnommmnnvumnooouxouxuuNoaommma
`
`
`
`
`
`
`
`
`
`A540amuoommoovmvauomummumaooouxmaxuamoaommmo
`
`
`
`
`
`
`
`
`
`
`
`
`
`A340oouommwuavuunmaqo«gnawmaooouxmaxuaoaaommmo
`
`
`
`n2¢ucomanammmomwnmvmummumaoaouxmoxaammqwmuaa
`
`
`
`
`
`
`
`
`
`
`
`
`
`A240canenommmommrmmauvvumaaaauxmaxaammvwmmaa
`
`
`
`
`
`mm.U~,m
`
`
`
`
`
`nnquoouopommmomupmuaummnaaooouxoaxaamm¢vm~44
`
`
`
`
`
`
`
`
`
`mzauoouowmmmmommpmmunmaumoooo~ao4\aaaaaomomo
`
`
`
`
`
`
`
`
`
`A340namemmmmmomwnmNonmmmoooowxnaxaaaaaomomo
`
`
`
`
`
`
`
`
`
`A540ao_aNmmmmomunmm¢"uv"moooouxmaxaa«aaamomc
`
`
`
`
`
`
`
`
`
`m:4uavnamammmomwpmmannamoooouxoaxaauuuomomo
`
`
`
`nnquoouoummmmomwnmamu¢mmoooouxmaxaaNuwomamo
`
`
`
`
`
`
`
`
`
`nm4ummna~mmmmom~nmmmnwoumooaouxmaxaauuuomoma
`
`
`
`
`
`
`
`
`
`nndummuoNmmmmommnmmauoaumoooouxmaxaaNuuomomo
`
`
`
`
`
`
`
`
`
`n=¢u»bouoNmmmmommnm.n¢uo~umoooouxoaxaammmomomo
`
`
`
`
`
`
`
`
`
`
`
`nzwumonoNmmmmomunmauummnvaooouxm4\-aoqommmo
`
`
`
`
`
`
`
`
`
`nzdumonoooonmmmnoevonmvumanoomxmaxwquoaommmn
`
`
`
`
`
`
`
`
`
`nzmumonoooonmmmnowmaumaumaHoo~\~o\aouoqommmo
`
`
`
`
`
`
`
`.........:lX......::....x....:..l1...4t.l..£kI..:...II..:-...........l1.....:.:..I.....1.211..x.....la3::....x..'Iz:...ll...:1lI...llK.:l..I.......I..I...0nmnummwnammoooomxoaaafl
`
`
`
`
`mn4una_~ummmmammnm-"~aumoooouxoaxaaaaaomomo
`anaomomo
`
`comm
`
`
`
`
`U.S. Patent
`
`Feb.19,2008
`
`Sheet34 0f36
`
`US 7,333,798 B2
`
`5:13.d.$\..Jl.u.nx...
`
`3gm
`
`_o¢m
`
`
`
`U.S. Patent
`
`9,1b.e
`
`FEmm
`
`
`
`u_._.3:=2_Eao.ah_
`
`#2.:_an_s:c_.uo=.
`
`momm_flmm
`
`0.ME958min$451.3.§=n23am
`
`
`8Osman.mmdozmmm»mm.»“E.aamamoa
`
`
`
`oaunfimmmozw«E.mm»mm.»%§§.3
`
`
`
`
`
`oamnfimmqozmmm»mm»WE.fifimmanm
`
`US 7,333,798 B2
`
`3mm
`
`mmHim
`
`%E.HWHNEC..2u._3;._..z3233B..mnE..z
`
`
`
`Soamnfimuqozmmu»oz“E.8o~o§R
`
`mmsuzumu»mayat,Ewmmfia4..Q8332mmnuzmME.ac.asmfiammwzmMaamncfi
`
`
`
`gamma:mudzmmm»as.ME,Bmmfina
`
`
`
`
`3osmacfimmsozmmm»an.“E,xmmmmwzm
`..m83:3mmzozmozmu»ma,mflmmomfim
`5832$mfiozm“E.ME.mumanflmwzm
`
`29rashm2x...«nmfl..9u
`
`
`
`U.S. Patent
`
`F
`
`%
`
`US 7,333,798 B2
`
`%3Ivcoufimvcoxfi
`.mo>u.wwumo>E
`
`4.._.:%<
`
`U,confimutog
`
`
`
`%:ou.§.mv_.Ho>>.5>.5moxm
`
`sEm.2Eo:3mMBcoboflm
`
`
`
`Bofimnm35:000359
`
`AZ<>Cmzo
`
`..........................................................................................X‘
`
`3.05
`
`oEoE2m
`
`wfimcom
`
`oo_>uQ
`
`
`
`
`
`
`US 7,333,798 B2
`
`1
`TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of
`telephone communication systems in penal institutions or
`similar facilities. In particular, the present invention relates
`to a computer-based telecommunication system with the
`capacity to allow an institution to control, record, monitor,
`and report usage and access to a telephone network.
`
`BACKGROUND OF THE PRESENT
`INVENTION
`
`Generally, the need to monitor, control, record and pro-
`vide detailed records of the usage of a telephone system in
`a controlled institutional environment is well recognized. It
`is common to utilize a controlled telephone system capable
`of monitoring outgoing telephone connections in many
`types of institutional environments, such as, but not limited
`to, penal institutions, military institutions, hospitals, schools,
`businesses, or specific types of government institutions. The
`reasons for monitoring and controlling institutional tele-
`phone systems are evident. To prevent such institutions from
`incurring unaccountable telephone costs,
`the institutions
`must either restrict access to outbound telephone lines or
`employ a telephone monitoring system to charge the respon-
`sible party for making the outbound communication. Oth-
`erwise, unaccountable telephone costs would severally
`hinder the availability of the telephone systems in institu-
`tions.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Therefore, it is imperative for many institutions to utilize
`a communication system that provides an accurate identifi-
`cation means for administrators to determine the individual
`
`35
`
`responsible for each outbound telephone call. A communi-
`cation system must also provide a monitoring means for
`maintaining a useful record of the communication. Addi-
`tionally,
`the system may include a means for restricting
`access or a means for providing options to particular users.
`Considering the number of users in a large institution,
`different payment methods available, and the excessive call
`volume at many institutions, it is evident that an effective
`telephone management system is essential.
`Providing telephone systems in specific types of highly
`restricted institutions, such as in penal institutions, results in
`the consideration of numerous additional complicating fac-
`tors. Generally, outbound communication means in penal
`institutions are heavily regulated by the government. There-
`fore, communication systems implemented in penal institu-
`tions or similar facilities must meet greater security require-
`ments often mandated by regulatory bodies affiliated with
`the county, state, or federal institution. Thus, the communi-
`cation system used in a regulated institution must employ
`unique functions often unnecessary in other types of insti-
`tutions.
`
`In its most general form, a penal institution’s telephone
`system utilizes a call processor to approve and place a call,
`surveillance equipment or monitoring equipment, and a
`recording device for evidencing the conversation. Generally,
`these simple systems are not equipped to restrict an inmate
`from calling any individual. However, it is preferable for the
`call system devices now employed in such institutions to
`have the capability to thwart an inmate from calling certain
`specific individuals or types of individuals. Without the
`necessary constraints on an inmate’s use of the telephone
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`inmates have often harassed outside parties or
`system,
`individuals. For example, it is generally preferred that an
`inmate should not be able to place a telephone call to the
`prosecutor who prosecuted the inmate’s case or another
`attorney responsible for the sentencing of the inmate. In
`another example,
`it may be preferred that an inmate be
`prevented from contacting the victim of the inmate’s crime
`or witnesses from the inmate’s case.
`It has also been
`
`documented that inmates have used previous penal institu-
`tion call systems to perpetrate additional criminal activities
`such as fraudulent schemes or specific criminal conspiracies.
`Specifically, inmates have been known to arrange credit card
`fraud attempts, the smuggling of contraband into the facility,
`and have even been known to arrange escape attempts over
`the penal
`institution’s telephone system. Therefore,
`it
`is
`critical in an efficient penal institution to carefully monitor
`all outgoing telephone calls making a regulated penal insti-
`tution telephone system a necessity.
`Another concern in implementing an efficient institution
`telephone system is cost control. In order for a system to be
`cost effective the system must critically monitor and record
`the activities of each individual user to properly charge each
`individual caller for his or her outgoing calls. Typically,
`telephone communication systems in penal institutions pro-
`vide an inmate with a telephone account upon arrival. Each
`individual receives an account number. There are several
`
`options for an inmate to select with respect to payment on
`the account. For example, an inmate may place prior per-
`sonal earnings into the account. The cost of each call is then
`deducted from the total amount in the inmate’s account until
`
`no balance remains. The inmate may choose to utilize collect
`call means. In addition, or alternatively, an inmate may be
`assigned a commissary account, where funds are added to
`the account based on work performed by the inmate. As the
`funds increase, the inmate may apply these funds to the cost
`of placing telephone calls. The inmate debit account may be
`located onsite, at a central office facility, or at a third-party
`site.
`
`The inmate debit account may alternatively be controlled
`by the inmate’s family. For example, the inmate’s family
`may control the inmate’s access to the debit account either
`remotely (e.g., by using the Internet, accessing a toll-free/
`pay to dial telephone number, using a mail form, etc.) or by
`visiting the prison facility. The inmate’s family may add
`funds to the debit account and thereby control
`the call
`volume allowed to the inmate.
`
`Another requirement of a secure telephone management
`system in a penal institution is the accurate identification of
`the telephone call participants. Generally, it is common in a
`penal institution to assign each inmate a personal identifi-
`cation number (PIN). When an inmate attempts to place a
`telephone call, the inmate must supply a valid PIN to gain
`access to the telephone system. However, a primary problem
`with this identification method is the ease of obtaining
`another inmate’s PIN. For example, individuals who com-
`monly forget their PIN may write it down, increasing the
`possibility that an unauthorized individual will view the PIN
`and use it. In addition, if a PIN number is compromised and
`utilized by an unauthorized inmate, the unauthorized inmate
`may then be able to call certain individuals who are
`restricted to that inmate, since the unauthorized inmate is no
`longer using the proper PIN associated with that inmate. In
`known systems, the PIN identification method is incapable
`of verifying that the individual who supplies the PIN is the
`actual specified inmate. Some systems have attempted to
`improve security by requiring the use of a debit card in
`conjunction with a PIN. The use of the debit card will only
`
`
`
`US 7,333,798 B2
`
`3
`allow access to an inmate’s account if the correct associated
`
`PIN is supplied. This method, however, provides only mini-
`mal additional protection because a debit card and its
`associated PIN can often, with or without force, easily be
`taken from another inmate, or given to another inmate,
`especially in the violent atmosphere of a penal institution.
`For example, one inmate may threaten another inmate in
`order to obtain such information. Alternatively, one inmate
`may provide certain services in exchange for the use of
`another inmate’s telephone privileges. The possibility that
`two inmates will exchange accounts also exists,
`thereby
`allowing them to contact people that would normally be
`restricted to them.
`
`Further attempts to obviate security concerns include
`requiring personal information, in addition to a PIN, to be
`supplied by the inmate/user. For example, a user might be
`prompted to supply a PIN as well as certain information that
`may only be known to the user. A common example is a
`request by the call system to provide their mother’s maiden
`name. This provides an additional security measure, but
`again is minimally secure because such information can
`easily be obtained in a correctional facility. It would there-
`fore be desirable to develop a telephone management system
`that incorporates an improved method of identification and/
`or verification.
`
`Another required feature of a telephone management
`system for a penal institution or similar facility is a means
`for restricting calls placed by a user (e.g., an inmate). It is
`well documented that inmates often try to harass individuals
`related to their arrest or confinement, such as judges, pros-
`ecutors or witnesses, etc., through telephonic communica-
`tions. Penal institutions have attempted to prevent this by
`restricting the telephone numbers each inmate is able to
`access. For example, a system may utilize a PIN or other
`identification means to access a list of telephone numbers
`that the inmate may not call, or alternatively, the system may
`access a list of numbers that the inmate is authorized to
`
`the numbers
`the inmate can only call
`to (i.e.,
`connect
`appearing on the list). Telephone numbers placed on the
`restricted list can include any individual related to the
`conviction (e.g., the arresting police officer, the prosecuting
`attorney, etc.), while telephone numbers placed on the
`permitted list may be, for example, close family relatives.
`The system may also limit the amount of time each inmate/
`user is permitted to conduct each outbound telephone call
`through the system. Furthermore, restrictions may be regu-
`larly updated. For example, if an inmate misbehaves, the
`inmate’s telephone privileges may be further limited or
`revoked completely.
`Penal institutions are also concerned with monitoring the
`activities and communications of inmates. Monitoring tele-
`phone activities is necessary to restrict connections to illegal
`activities outside of the institution.
`
`Three existing types of call monitoring techniques are
`known in the art. The first technique is live monitoring. Live
`monitoring requires an operator or other individual to listen
`to each telephone call and alert the proper authorities if
`necessary.
`The second type of monitoring involves recording the
`telephone conversation via a common recording device. A
`common example of this is a recording device such as a
`magnetic tape drive. This type of monitoring may be con-
`tinuous or intermittent depending on the degree of security
`required for each inmate.
`The third type of monitoring is known as passive mom-
`toring. Passive monitoring may be activated when certain
`keywords are spoken. In addition, passive monitoring may
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`be activated if the telephone call at the termination end is
`transferred to a third party via certain known detection
`means such as “click and pop” detection, etc.
`Penal institutions currently record most inmate telephone
`calls, with the exception of lawyer-inmate communications
`which are generally prohibited by law. Typically in the art,
`monitoring may occur using any combination of the three
`methods (e.g., live monitoring, electronic recording mom-
`toring, or passive monitoring). However, it would be desir-
`able for a telephone management system to embody a means
`for determining which level of telephone monitoring should
`be employed for each telephone call. For example, it would
`be advantageous to flag certain individuals in an inmate’s
`profile as highly suspicious. If the inmate initiates commu-
`nication with the flagged individual, the system will alert a
`live operator to monitor the system. In such a system it is
`essential that the system correctly identify the called indi-
`vidual to avoid unnecessary expenditure of live operators.
`Alternatively, the inmate telephone call system may uti-
`lize a remote alert notification system wherein the system
`contacts an operator when a violation has occurred. The
`system may contact the operator utilizing telephone means,
`paging means, etc. This notification system may be set to
`call the operator a limited number of times or until the alert
`has been noted in the inmate telephone call system. The
`operator may then access information about
`the alert
`remotely using the telephone, Internet, or any other such
`remote access means.
`
`In order to alleviate some of the problems and concerns
`discussed herein, many penal institutions have implemented
`certain task-specific advanced systems. Generally,
`these
`“advanced” systems known in the art comprise several
`features.
`
`For example, it is known in current systems to employ
`permanent call blocking. Specifically, it is known in the art
`to block an inmate or group of inmates from dialing certain
`telephone numbers. Most systems also prevent inmates from
`talking directly to live operators. This prevents inmates from
`requesting that the operator forward a call or provide addi-
`tional telephone numbers allowing the inmates to harass or
`locate additional parties. Furthermore, current systems block
`“l-800,” “l-900” and other like telephone numbers includ-
`ing toll-free and pay-to-dial telephone numbers. In addition
`certain institutions may elect to block country codes, spe-
`cific area codes, or other third-party numbers.
`Current systems known in the art may also utilize a
`feature commonly referred to as “selective” call blocking.
`As discussed, “selective” call blocking may be employed to
`thwart
`inmates from establishing a connection with a
`selected group of individuals (i.e., with the home telephone
`of prison guards, wardens, indictment witnesses, trial wit-
`nesses, police officers, judges, etc.). It is also foreseeable
`that the telephone numbers of the family members of these
`specific individuals may also be blocked.
`Some current systems also limit
`the use of specific
`long-distance carriers. This feature proves useful in limiting
`unnecessary costs incurred by employing alternating carri-
`ers.
`
`systems utilize features commonly
`current
`Several
`referred to as “flash hook” prevention or “click” and “pop”
`prevention modes. These systems prevent
`inmates from
`extending the current outgoing telephone call and entering a
`new telephone call with a new number without fully termi-
`nating the original telephone call. For example, this prevents
`an inmate from utilizing common call forwarding features
`and the like.
`
`
`
`US 7,333,798 B2
`
`5
`In addition, some current institutional telephone systems
`electronically or manually disable the keypad after a tele-
`phone number is dialed and the telephone call is connected.
`This feature prevents inmates from interacting with tele-
`phone games and lotteries, and in certain older systems,
`prevents the inmate from achieving an unrestricted dial tone.
`Another common feature employed by institutional sys-
`tems is three-way call prevention. This feature prevents an
`inmate from instructing the called party to bridge the tele-
`phone call to another telephone number.
`Other known systems in the art may exhibit other regu-
`latory features. For example, generally, telephone commu-
`nication systems allow an institution to limit the duration of
`a telephone call and/or to limit the cost of the telephone call.
`These types of features further allow a facility to customize
`the telephone call systems thereby preventing unrecoverable
`expenditures.
`institution telephone
`Another control used by current
`systems is the use of certain aspects of biometric recognition
`for the identification of users or inmates (i.e., the calling
`party). However, systems known in the art have only used
`biometrics to a limited extent. It is highly beneficial for
`communication systems in penal institutions to incorporate
`biometrics as an additional security device. Biometric rec-
`ognition is commonly available in a number of fields. For
`example, biometrics recognition has found a number of
`security uses, including common usage, in credit card sys-
`tems and building security systems. Biometric information
`includes fingerprints, hand geometry, voiceprints, retinal
`patterns, iris scans, signatures, infrared facial patterns, and
`all other sources which constitute unique physiological
`characteristics and which can assist in establishing a per-
`son’s identity. Various devices exist which can scan one or
`more biometric characteristics and digitize the information.
`The features discussed herein are present in several prior
`art references. For example, Hird, et al. U.S. Pat. No.
`4,890,317 discloses an automatic account number validation
`and billing management system. The system disclosed in
`Hird et al. prompts a user for an account number and
`compares the number inputted to a number stored in a
`database to determine va