`
`United States Patent
`Hodge
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,333,798 B2
`Feb. 19, 2008
`
`US007333798B2
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`-
`75
`(75) Inventor: Stephen Lee Hodge, Aubrey, TX (US)
`-
`-
`- -
`(73) Assignee: Value Added Communications, Inc.,
`Plano, TX (US)
`-
`-
`- -
`-
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 442 days.
`
`sk
`-
`(*) Notice:
`
`(21) Appl. No.: 10/215,367
`
`(22) Filed:
`
`Aug. 8, 2002
`
`(65)
`
`Prior Publication Data
`
`|US 2004/0029564 A1
`
`Feb. 12, 2004
`
`(51) Int. Cl.
`H04Q 7/20
`
`(2006.01)
`
`(52) U.S. Cl. ................... assail, assalo. 379,9302
`379,142.05
`(58) Field of Classification Search ................ 455/410,
`455/411, 563,405, 406, 555, 560, 41.4.1,
`455/445, 55; 379/88.19, 88.02, 114,03, 265.01,
`379/142.1, 1422, 142.05, 142.06, 93.02;
`726/5: 713/169, 202; 380/247; 235/379
`See application file for complete search history.
`References Cited
`
`(56)
`
`|U.S. PATENT DOCUMENTS
`
`5,274,695 A * 12/1993 Green ..................... 379/88.02
`5,473,671 A * 12/1995 Partridge, III .............. 455/445
`5,485,507 A *
`1/1996 Brown et al. ...
`... 379/88.08
`5,502,759 A * 3/1996 Cheng et al. ...
`... 379/88.02
`5,655,013 A * 8/1997 Gainsboro .................. 379/188
`5,717,743 A * 2/1998 McMahan et al. .......... 379/188
`
`5,923,746 A * 7/1999 Baker et al. ........... 379/.265.02
`5,943,403 A * 8/1999 Richardson et al. ..... 379/88.26
`6,084,967 A * 7/2000 Kennedy et al. ............ 380/247
`6,104,922 A * 8/2000 Baumann ...
`... 455/410
`6,182,221 B1* 1/2001 Hsu et al. ...
`... 713/186
`6,213,391 B1 * 4/2001 Lewis ....
`... 235/380
`6,219,439 B1 * 4/2001 B
`- - -
`... 382/115
`6,282,566 B1* 8/2001 | "..." ... 709/217
`6,377,699 B1 * 4/2002 Musgrave et al. .......... 382/117
`6,389,397 B1 * 5/2002 Otto ........................... 704/270
`6,668,045 B1* 12/2003 Mow .........
`... 379/88.19
`6,687,733 B2 * 2/2004 Manukyan .................. 709/200
`6,819,219 B1* 11/2004 Bolle et al. ................ 340/5.52
`6,836,556 B1* 12/2004 Bromba et al. ............. 382/124
`6,950,508 B1* 9/2005 Griffiths ...........
`... 379/201.01
`2002/0042879 A1 * 4/2002 Gould et al. ................ 713/176
`2002/0177433 A1 * 1 1/2002 Bravo et al. ................ 455/411
`
`-
`
`FOREIGN PATENT DOCUMENTS
`2 148 569 A * 5/1985
`GB
`* cited by examiner
`-
`-
`-
`Primary Examiner—Jean Gelin
`y
`-
`(74) Attorney. Agent or Firm-Ward & Olivo
`(sº)
`ABSTRACT
`A secure telephone call management system is provided for
`authenticating users of a telephone system in an institutional
`facility. Authentication of the users of the telephone call
`management system is accomplished by using a personal
`identification number, biometric means, and/or radio fre
`quency means. The secure telephone call management sys
`tem includes accounting software capable of limiting access
`to the system based on funds in a user’s account or other
`related limitations. The system includes management soft
`ware capable of implementing widespread or local changes
`to the system and is further capable of modifying or setting
`any number of user account parameters.
`
`5 Claims, 36 Drawing Sheets
`
`
`
`
`
`
`
`Electronic
`* Switchboard
`
`
`
`|
`
`RF Receiver
`
`
`
`
`
`#|Biometric
`# Sensor
`
`
`
`-------------------------------- * * *-* *** ----------------------------,
`
`Admin.
`Workstation
`
`<-120
`
`Shadow
`Workstation
`
`
`
`:
`Investigative <!-
`Workstation
`125 :
`
`Commissary *— 121 :
`
`CMS (WAN)
`
`GTL 1005
`IPR of U.S. Patent No. 8,340,260
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 1 of 36
`
`US 7,333,798 B2
`
`0?I ?
`
`SZI ?
`
`IZI ? | Kuess!uuuuoO
`
`
`
`
`
`
`
`
`
`opny
`
`IBIJOS |
`
`I
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 2 of 36
`
`US 7,333,798 B2
`
`
`
`Fiaiil‘iiiiilEElli:i.
`
`PamEN
`
`Sm
`
`\U3%m
`
`35>
`
`_s‘ljom
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 3 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`IOZ
`
`QIS
`
`||(x,va | || 3 NoHa
`
`I IZ ?
`
`XO8IA) IS
`
`TORIJANOC) $Z
`
`'YICIOIV
`
`GIOIOOGICI
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 4 of 36
`
`US 7,333,798 B2
`
`
`
`HOODED_mzoy80ch
`
`
`
`.Gomn—
`
`m?
`
`Eom
`
`Sm:
`
`m?mmv
`
`moo:
`
`.AOm
`
`Ear—[G
`
`\mM—QZm
`
`mm>0m
`
`vfiuwx—U
`
`HUM—Hm:—
`
`Own—DAN
`
`><AEQH¢
`
`mNV
`
`wowwow
`
`
`
`
`
`Em
`
`.25a?
`
`SN
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 5 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`V LVCI
`
`QRIJACIJWOI8I
`
`RIGINNVOS
`
`
`
`U.S. Patent
`U.S. Patent
`
`9,1b.eF
`
`oo00
`
`S
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`2..................................................................................
`
`
`
`357501:03
`
`mmpm
`
`PM:Uv—HU“VHH.
`
`
`HEEox;25m
`
`How
`
`>\VEOBEZ
`
`
`
`
`
`
`
`
`
`6.oizoo58-43:qomazou25mKh.................................................................................
`
`6+m8m05372223—nmm<=m”5350mm
`
`
`:0/moo<m—\~UmnFE..................................................
`Evgout/50
`
`Mmmpm
`
`
`
`9 "?INH
`a.me
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 7 of 36
`
`US 7,333,798 B2
`
`
`
`
`ººk T*| L'Hoa owal
`JLRIVIT
`
`8 { {60
`
`í
`
`|XHOVT | W3CIOW
`
`INIT
`
`
`
`WOO TVIRHTHS
`
`
`
`TIVO OTI
`
`TORIJLNIOC)
`
`SS[\{
`
`
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet8 0f36
`
`US 7,333,798 B2
`
`_Ev.UOMm
`
`HU~O>
`
`5956
`
`an“:
`
`><-m<
`
`vwmm
`
`FaggomuAImom
`
`”Hm—”EDM—Onflm2w
`
`mom
`
`
`
`093w
`
`F5252
`
`cm:
`
`Eém
`
`<H<Q
`
`w.UE
`
`
`
`lm;
`
`
`
`Joann/HODA<UOA
`
`mmDm
`
`3%
`
`......................................................................................................................................................................................................................................................................................................................................................................................................................................
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 9 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`/06 —>
`
`| 06 —>
`
`
`
`INOO TVIRIQIS
`
`SIRIO&H
`
`
`
`
`
`JANVYIS
`
`INGIAIINORI
`V JLWCIJAIGIIN
`
`
`
`É [69 [6
`
`TWOOT
`
`TOYHLNOC)
`
`SS[18I
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 10 of 36
`
`US 7,333,798 B2
`
`
`
`Lae aes ) ... , …,
`
`| || 0 ||
`
`
`
`be
`Feb. 19, 2008
`w
`
`F5:
`
`| 0 || ||
`
`U.S. Patent
`U.S. Patent
`
`
`
`co:
`00? ?
`
`m8:9.mt.
` ;.LkL.IImime-J?3.3.3...5—,.”4
`
`.Eywhw..gm...xii;:fin$3.3“.
`
`63f011t
`hS
`Sheet 11 of 36
`
`w8:
`
`90 I I
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`3.3%a.
`
`pmI
`
`:dam
`?INH
`
`.xx»:
`
`
`
`
`
`.M43,m‘n.,..‘1,4,2”;
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 12 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`LOZI
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ZI “?IH
`
`
`
`-* - * * • • •--------~--~~~~!------- ------~--~~~~--------------------------~--~~~~----+------------------~~~~~~~~|~~~~--~~~--~~~~
`
`;------?----+--------------------~--~#~####----------?+(––8
`
`***x=~~~---------
`
`
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`ÇI "?INH
`
`U.S. Patent
`U.S. Patent
`
`
`
`1b.eF
`
`002
`
`S
`
`f031
`
`9,$2
`
`a:2
`
`32
`
`%2:
`
`m82
`8a:
`mcwmnufihaEEmuI. 8252co?
`
`3.5on55512
`
`
`
`22
`
`
`
`U.S. Patent
`
`9a1b.eF
`
`8m
`
`233
`
`Smoi
`
`63f041teeh
`
`US 7,333,798 B2
`
`:3mil
`
`_.n
`
` co:
`
`3%.?
`
`
`.flap?.9
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 15 of 36
`Sheet 15 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`1533
`
`1535
`
`1517
`
`FIG.15
`
`r~
`(\1
`a
`
`«3
`04mv—4
`
`
`
`151315151507
`
`1511
`
`V)
`c:Wr—1
`
`1500
`
`y E h
`
`E
`a:
`1:
`
`at
`.3
`fl,
`.—
`3M
`‘9;
`r
`$3
`
`w»
`V)
`o
`F.
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 16 of 36
`Sheet16 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`.1ll.75154111111!trlri15...:-
`.1111511
`
`”my«2,«my.-moJ.oz”.
`
`33%
`
`“or
`
`«.3.
`
`an}
`
`um}
`
`
`.311MHW.HM.H#..11.2.1hm}.
`mm}want
`3%mm?oz
`no}.no}02
`
`”war“
`
`
`
`1mg,Amman.
`
`3}an}02
`
`an}no}.02.
`
`9 I ’0IH
`
`
`
`mvfi,mvmwm
`
`83
`
`:3
`
`82
`
`002
`
`
`
`
`
`.33%.:Em.occsum_mh.u_m_=31
`
`+82
`
`111Flt-11.1.5
`£23:m111
`
`am}NSmmummnm
`
`
`
`.l...|.l|..lililll|zlitlkt
`
`3}mommmowmnm
`
`
`1”}.quSmmmomwnmtf.
`may“;mNN_.5mmB111.
`.1011’1‘1111111!II:1,
`
`infllis
`
`3;,Hm,r530.3
`all8}.mNPBmmmmm
`
`8}WmEmmmmmnm
`
`we,38538
`
`”myREES
`
`mew:
`
`22
`
`:2
`
`SS
`
`22
`
`mmww
`
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 17 of 36
`
`US 7,333,798 B2
`
`LI "OIDH
`
`gael ¿
`
`
`
`
`
`
`
`U.S. Patent
`
`000029,1b.eF
`
`63
`
`US 7,333,798 B2
`
`S36me
`
`M5&3?m8mg?
`Ml»wamfimrmwxmvmr
`
`gym?
`
`mevmv
`
`a.Emmfimtmmgg
`
`
`
`h.Emmydfififiam
`
`‘EmafinmH53SSEEh5.th.immwujam.wH5B.EEEEuEHfigfiam
`p3mm”
`
`EEE
`
`Egan:E8%
`
`555$
`
`883$
`
`38%
`
`
`
`0::
`
`com:
`
`mom:
`
`8M:2:SM:
`
`,Liiaikx,.lvltiglfin
`
`mafiagmEuzfiw3,1334
`
`.rE?:r...i
`
`3.UHH
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 19 of 36
`Sheet19 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`mama
`
`0061
`oomfi
`
`[06]
`Mama
`
`LE: ED.
`
`
`
`
`
`“haiku—H.mfi.m..:=—u:mm*flfin:fl1In
`
`6 I "?INH
`
`a.03
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb.19,2008
`
`Sheet20 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`
`xlrtrxlif
`
`“gnaw—3a.¥—3_mu..n>vmwI«.
`
`cm.UE—
`
`mmommmow
`
`28:238
`
`moon
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 21 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IZ “OICH
`
`IO IZ
`
`|
`
`LO IZ
`
`60 IZ
`
`9 || || Z.
`
`S I IZ
`
`
`
`U.S. Patent
`U.S. Patent
`
`
`
`Sheet 22 of 36
`
`Feb. 19, 2008
`mF
`
`m3%m83
`
`M8%
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`wUEEMnE,.
`
`nghagE23@255
`
`¿¿.*¿¿.….……………………
`
`3mm
`
`NN.Umm
`ZZ "?INH
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 23 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`§§§§§§) Cae?ae!!!!!******** **
`
`009 Z
`
`%,
`
`
`
`S08%
`
`109 Z619 Z/ I £Z
`
`£Z “?INH
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb.19,2008
`
`Sheet24 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`2.
`s
`
`3
`s
`
`oovm
`
`3. rº)
`
`#Nwm
`
`mmvm
`
`mmwm
`
`nmvm
`
`§§
`
`
`
` r.,‘.rfilwsflg.u
`
`
`
`éflm‘wflw..
`
`33.3%flag.3
`
`mmwm
`
`mfivm
`
`Hmfim
`
`vm.UHm
`
`
`
`
`
`
`
`
`
`mafia.”mam.1mm$.93.an
`
`
`
`
`
`
`
`
`.“Ngislt$r$Exit...Ti...l;.....ila§.§.5§>5......»I...r....13.}...25.....6...........3...!.1...
`
`
`
`
`
`
`..‘...I.ll|ll.l.ittill).iilrilv.).(15.1.!.1.l..Ii..§Ili.l.\.€lr.1|.1.l.-ilv.l.ll.u33131.1.x\L...gamma“..
`
`..Hmm-Earn._1.1.1..a..a....zI..1.
`_..Nmm#83?
`
`
`.11....11:.LL..|..$1.1...ILlill.l...l.|{.LLKIIEE.Eybxerbtlili...ilk-l
`MNBdmmnw.
`311$}.Il.4ll.(.{f...(.lt...5..!.$.ix?-\e)..isia..\.§....l.vltlt§llnlrL1..
`
`
`.11I;...5511.ling»!!!1......I..|r.I..916.i.
`
`
`
`-------~--~~~#~~~~--~~~~|~~~~--~~~~--~--~~~~ ~~~~ ~~~~F-~~~~);~~~~ ~~~~
`
`
`
`
`
`
`
`.mmawmha.
`.$ENE
`
`:12.--£45..
`mmfimk...
`..If...)5....)1:34.111...momma
`
`
`
`.31...u....fv...11:A
`Bmmfi
`Eda”...
`
`8..figwwmfi
`
`........~».n.p:.41...».....
`
`mm.Umm
`SZ ’5)IDH
`
`.Bdme
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 25 of 36
`Sheet 25 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`
`....
`
`
`
`
`
`
`
`.irriiirll‘iiléifblltt.lilriiz.‘.3.six‘avilIalio.g...32.2.!Stilt.1.\.01.5.3!ital........izsrilf...‘.....i.21l..lwlta5.
`
`
`!!-----------------------------------~--~~~~~--~~~~£75!!~~~(~~~~
`,amm.3...»
`
`
`
`.i..l;.l_lvl...1.5.2.1)...2-3.3.1.}...533......5.331.!!!.II..321....(...
`
`
`
`***-**********…*-----------------------------~--~~~~--~~~~~~ ~~~~ ~~~~.~~~~~--~~~~. --|------********* •••••••••••••
`
`
`
`
`
`
`
`..1..............................a.1.1..«311.4...E3.3.31.2...
`
`
`
`III-ELEIIII.1.....SL11-aix9.275-5.1r.1.¥:.ili.x.§lt.s.}lra<bL;{51.5.....i...M..Emma”.
`
`
`
`
`
`2..i..fataabgirilxnhixfiai.1.)}.1-T...
`
`
`
`
`
`8mm
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 26 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`:3!!!)
`
`
`
`303598.x.4...:v..2:.lll.|)l.-|.I:nvi.\llv£l.l.vul.l{I33.
`42..4.....
`
`
`3{1.113.}...flyk.z..i§l.l%Tul‘fll
`[33Emma,Qua”
`
`.23BEE
`
`.23has?8.33
`
`
`
`.35Emma“.3.3mm
`
`$3BE?88a:1...x$:!rr1¥..l+!;.;:!1..I!k5!);
`
`
`
`8 .m..33E5983ml“;
`
`w.
`«$14,454:. w
`
`.wm;
`
`'
`
`..
`
`x3
`
`n1.«-.‘.x“~‘r-.M,u.
`
`
`
`II‘l‘lallultit-aaénbt
`
`
`
`
`
`
`.mmamthmmmfiw.
`.3
`
`Com2mmgcom
`mcm:8$8883888
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 27 of 36
`Sheet27 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`,m...._,
`'7 ‘6'“ \m.
`
`__
`r
`,
`3 ‘ saxwflufiiu.
`
`n
`
`6 I LZ
`
`S.
`
`º
`
`-
`
`
`
`
`
`~~~~ ~~~~,~*
`
`mmdw
`5N.Umm
`
`
`LZ “?IH
`
`50.8monmSum
`
`
`
`
`
`.‘t
`
`
`' «firm 5 ilk-‘35:»WA».EW‘WHF.53?“
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 28 of 36
`
`US 7,333,798 B2
`
`
`
`008Z
`
`?I 87
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 29 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`2929
`
`FIG.29
`6Z “OICH
`
`2900
`
`2921
`
`2915
`
`2913
`
`2911
`
`2901
`
`
`
`U.S. Patent
`U.S. Patent
`
`01,,
`
`00m
`
`hS
`
`f003t
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`mmmmom
`
`cm.Umm
`
`09 *5) I H
`
`Hoom
`
`moom
`
`moom
`
`meow
`
`mfiom
`
`hfiom
`
`b.33
`9‘poem
`“wmfiom
`%fifiOm
`
`
`
`
`
`
`«mafia—emuIAll!ooom
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 31 of 36
`Sheet 31 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`,«4.x.
`
`‘.memmmmmra
`
`.w,
`
`_H_m 2.3amine.»
`
`“5::
`
`
`
`w.
`
`_qflw§§nfifififi
`.,4m,
`
`in...»
`
`Hm.UHm
`I º ‘‘DIH
`
`| I || 9
`
`oofim
`
`4/8:
`
`5.92..#5.
`
`[0][9]
`Hofim
`
`mofim
`
`mofim
`
`hc_m
`
`
`
`U.S. Patent
`U.S. Patent
`
`. 19, 2008
`Feb
`Feb
`.19,2008
`
`Sheet 32 of 36
`Sheet32 0f36
`
`333,798 B2
`US 7
`9US7
`333,798 B2
`9
`
`
`
`mzfimumfixmhwfl comm
`
`
`
`
`
`050a.«mannammmomomo
`
`
`
`Guamanaghvvvomomo
`
`
`
`hmmstuZHhmM—aNNNomomo
`
`
`
`
`
`mamammHAquflHoaommmo
`
`
`
`moqdbdMoonnadommmo
`
`
`
`MubmaoquHBHoaommmo
`
`
`
`933memoaommmo
`
`mm.0:—
`
`Z9 °5) I H
`
`moaommmo
`
`wadommma
`
`.xl;
`
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 33 of 36
`
`US 7,333,798 B2
`
`
`
`I
`-- - - - - - - - - - - - - - - - -
`
`$ $ "OIH
`
`9.134.385$ : I 5 : 80 0002/0?A’T I T T T 06060
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 34 of 36
`Sheet34 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`HovM
`
`um.UHm
`
`
`
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 35 of 36
`
`US 7,333,798 B2
`
`6 IS £
`
`
`
`H SITIÐ ÞIGI
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`F
`
`1
`
`00
`
`63a
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`9,ceramic?
`
`m538.0%
`
`m5:38:03550m85
`
`goumgm3.55035m8309
`
`matomL\2HomCOHwoofim
`
`./Ewsfiam
`
`92%£20
`(NVA) SWO
`
`
`
`
`%m2Iv8:89:85Mgumwumgfi
`
`.H
`
`cm.UE
`99 "?INH
`
`030805
`
`mammcom
`
`8qu
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`US 7,333,798 B2
`
`1
`TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of
`telephone communication systems in penal institutions or
`similar facilities. In particular, the present invention relates
`to a computer-based telecommunication system with the
`capacity to allow an institution to control, record, monitor,
`and report usage and access to a telephone network.
`
`BACKGROUND OF THE PRESENT
`INVENTION
`
`10
`
`15
`
`2
`system, inmates have often harassed outside parties or
`individuals. For example, it is generally preferred that an
`inmate should not be able to place a telephone call to the
`prosecutor who prosecuted the inmate’s case or another
`attorney responsible for the sentencing of the inmate. In
`another example, it may be preferred that an inmate be
`prevented from contacting the victim of the inmate’s crime
`or witnesses from the inmate’s case. It has also been
`documented that inmates have used previous penal institu
`tion call systems to perpetrate additional criminal activities
`such as fraudulent schemes or specific criminal conspiracies.
`Specifically, inmates have been known to arrange credit card
`fraud attempts, the smuggling of contraband into the facility,
`and have even been known to arrange escape attempts over
`the penal institution’s telephone system. Therefore, it is
`critical in an efficient penal institution to carefully monitor
`all outgoing telephone calls making a regulated penal insti
`tution telephone system a necessity.
`Another concern in implementing an efficient institution
`telephone system is cost control. In order for a system to be
`cost effective the system must critically monitor and record
`the activities of each individual user to properly charge each
`individual caller for his or her outgoing calls. Typically,
`telephone communication systems in penal institutions pro
`vide an inmate with a telephone account upon arrival. Each
`individual receives an account number. There are several
`options for an inmate to select with respect to payment on
`the account. For example, an inmate may place prior per
`sonal earnings into the account. The cost of each call is then
`deducted from the total amount in the inmate’s account until
`no balance remains. The inmate may choose to utilize collect
`call means. In addition, or alternatively, an inmate may be
`assigned a commissary account, where funds are added to
`the account based on work performed by the inmate. As the
`funds increase, the inmate may apply these funds to the cost
`of placing telephone calls. The inmate debit account may be
`located onsite, at a central office facility, or at a third-party
`site.
`The inmate debit account may alternatively be controlled
`by the inmate’s family. For example, the inmate’s family
`may control the inmate’s access to the debit account either
`remotely (e.g., by using the Internet, accessing a toll-free/
`pay to dial telephone number, using a mail form, etc.) or by
`visiting the prison facility. The inmate’s family may add
`funds to the debit account and thereby control the call
`volume allowed to the inmate.
`Another requirement of a secure telephone management
`system in a penal institution is the accurate identification of
`the telephone call participants. Generally, it is common in a
`penal institution to assign each inmate a personal identifi
`cation number (PIN). When an inmate attempts to place a
`telephone call, the inmate must supply a valid PIN to gain
`access to the telephone system. However, a primary problem
`with this identification method is the ease of obtaining
`another inmate’s PIN. For example, individuals who com
`monly forget their PIN may write it down, increasing the
`possibility that an unauthorized individual will view the PIN
`and use it. In addition, if a PIN number is compromised and
`utilized by an unauthorized inmate, the unauthorized inmate
`may then be able to call certain individuals who are
`restricted to that inmate, since the unauthorized inmate is no
`longer using the proper PIN associated with that inmate. In
`known systems, the PIN identification method is incapable
`of verifying that the individual who supplies the PIN is the
`actual specified inmate. Some systems have attempted to
`improve security by requiring the use of a debit card in
`conjunction with a PIN. The use of the debit card will only
`
`Generally, the need to monitor, control, record and pro
`vide detailed records of the usage of a telephone system in
`a controlled institutional environment is well recognized. It
`is common to utilize a controlled telephone system capable
`of monitoring outgoing telephone connections in many
`types of institutional environments, such as, but not limited
`to, penal institutions, military institutions, hospitals, schools,
`businesses, or specific types of government institutions. The
`reasons for monitoring and controlling institutional tele
`phone systems are evident. To prevent such institutions from
`incurring unaccountable telephone costs, the institutions
`must either restrict access to outbound telephone lines or
`employ a telephone monitoring system to charge the respon
`sible party for making the outbound communication. Oth
`erwise, unaccountable telephone costs would severally
`hinder the availability of the telephone systems in institu
`tions.
`Therefore, it is imperative for many institutions to utilize
`a communication system that provides an accurate identifi
`cation means for administrators to determine the individual
`responsible for each outbound telephone call. A communi
`cation system must also provide a monitoring means for
`maintaining a useful record of the communication. Addi
`tionally, the system may include a means for restricting
`access or a means for providing options to particular users.
`Considering the number of users in a large institution,
`different payment methods available, and the excessive call
`volume at many institutions, it is evident that an effective
`telephone management system is essential.
`Providing telephone systems in specific types of highly
`restricted institutions, such as in penal institutions, results in
`the consideration of numerous additional complicating fac
`tors. Generally, outbound communication means in penal
`institutions are heavily regulated by the government. There
`fore, communication systems implemented in penal institu
`tions or similar facilities must meet greater security require
`ments often mandated by regulatory bodies affiliated with
`the county, state, or federal institution. Thus, the communi
`cation system used in a regulated institution must employ
`unique functions often unnecessary in other types of insti
`tutions.
`In its most general form, a penal institution’s telephone
`system utilizes a call processor to approve and place a call,
`surveillance equipment or monitoring equipment, and a
`recording device for evidencing the conversation. Generally,
`these simple systems are not equipped to restrict an inmate
`from calling any individual. However, it is preferable for the
`call system devices now employed in such institutions to
`have the capability to thwart an inmate from calling certain
`specific individuals or types of individuals. Without the
`necessary constraints on an inmate’s use of the telephone
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`
`
`US 7,333,798 B2
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`3
`allow access to an inmate’s account if the correct associated
`PIN is supplied. This method, however, provides only mini
`mal additional protection because a debit card and its
`associated PIN can often, with or without force, easily be
`taken from another inmate, or given to another inmate,
`especially in the violent atmosphere of a penal institution.
`For example, one inmate may threaten another inmate in
`order to obtain such information. Alternatively, one inmate
`may provide certain services in exchange for the use of
`another inmate’s telephone privileges. The possibility that
`two inmates will exchange accounts also exists, thereby
`allowing them to contact people that would normally be
`restricted to them.
`Further attempts to obviate security concerns include
`requiring personal information, in addition to a PIN, to be
`supplied by the inmate/user. For example, a user might be
`prompted to supply a PIN as well as certain information that
`may only be known to the user. A common example is a
`request by the call system to provide their mother’s maiden
`name. This provides an additional security measure, but
`again is minimally secure because such information can
`easily be obtained in a correctional facility. It would there
`fore be desirable to develop a telephone management system
`that incorporates an improved method of identification and/
`or verification.
`Another required feature of a telephone management
`system for a penal institution or similar facility is a means
`for restricting calls placed by a user (e.g., an inmate). It is
`well documented that inmates often try to harass individuals
`related to their arrest or confinement, such as judges, pros
`ecutors or witnesses, etc., through telephonic communica
`tions. Penal institutions have attempted to prevent this by
`restricting the telephone numbers each inmate is able to
`access. For example, a system may utilize a PIN or other
`identification means to access a list of telephone numbers
`that the inmate may not call, or alternatively, the system may
`access a list of numbers that the inmate is authorized to
`connect to (i.e., the inmate can only call the numbers
`appearing on the list). Telephone numbers placed on the
`restricted list can include any individual related to the
`conviction (e.g., the arresting police officer, the prosecuting
`attorney, etc.), while telephone numbers placed on the
`permitted list may be, for example, close family relatives.
`The system may also limit the amount of time each inmate/
`user is permitted to conduct each outbound telephone call
`through the system. Furthermore, restrictions may be regu
`larly updated. For example, if an inmate misbehaves, the
`inmate’s telephone privileges may be further limited or
`revoked completely.
`Penal institutions are also concerned with monitoring the
`activities and communications of inmates. Monitoring tele
`phone activities is necessary to restrict connections to illegal
`activities outside of the institution.
`Three existing types of call monitoring techniques are
`known in the art. The first technique is live monitoring. Live
`monitoring requires an operator or other individual to listen
`to each telephone call and alert the proper authorities if
`necessary.
`The second type of monitoring involves recording the
`telephone conversation via a common recording device. A
`60
`common example of this is a recording device such as a
`magnetic tape drive. This type of monitoring may be con
`tinuous or intermittent depending on the degree of security
`required for each inmate.
`The third type of monitoring is known as passive moni
`toring. Passive monitoring may be activated when certain
`keywords are spoken. In addition, passive monitoring may
`
`45
`
`50
`
`55
`
`65
`
`4
`be activated if the telephone call at the termination end is
`transferred to a third party via certain known detection
`means such as “click and pop” detection, etc.
`Penal institutions currently record most inmate telephone
`calls, with the exception of lawyer-inmate communications
`which are generally prohibited by law. Typically in the art,
`monitoring may occur using any combination of the three
`methods (e.g., live monitoring, electronic recording moni
`toring, or passive monitoring). However, it would be desir
`able for a telephone management system to embody a means
`for determining which level of telephone monitoring should
`be employed for each telephone call. For example, it would
`be advantageous to flag certain individuals in an inmate’s
`profile as highly suspicious. If the inmate initiates commu
`nication with the flagged individual, the system will alert a
`live operator to monitor the system. In such a system it is
`essential that the system correctly identify the called indi
`vidual to avoid unnecessary expenditure of live operators.
`Alternatively, the inmate telephone call system may uti
`lize a remote alert notification system wherein the system
`contacts an operator when a violation has occurred. The
`system may contact the operator utilizing telephone means,
`paging means, etc. This notification system may be set to
`call the operator a limited number of times or until the alert
`has been noted in the inmate telephone call system. The
`operator may then access information about the alert
`remotely using the telephone, Internet, or any other such
`remote access means.
`In order to alleviate some of the problems and concerns
`discussed herein, many penal institutions have implemented
`certain task-specific advanced systems. Generally, these
`“advanced” systems known in the art comprise several
`features.
`For example, it is known in current systems to employ
`permanent call blocking. Specifically, it is known in the art
`to block an inmate or group of inmates from dialing certain
`telephone numbers. Most systems also prevent inmates from
`talking directly to live operators. This prevents inmates from
`requesting that the operator forward a call or provide addi
`tional telephone numbers allowing the inmates to harass or
`locate additional parties. Furthermore, current systems block
`“1-800,” “1-900” and other like telephone numbers includ
`ing toll-free and pay-to-dial telephone numbers. In addition
`certain institutions may elect to block country codes, spe
`cific area codes, or other third-party numbers.
`Current systems known in the art may also utilize a
`feature commonly referred to as “selective” call blocking.
`As discussed, “selective” call blocking may be employed to
`thwart inmates from establishing a connection with a
`selected group of individuals (i.e., with the home telephone
`of prison guards, wardens, indictment witnesses, trial wit
`nesses, police officers, judges, etc.). It is also foreseeable
`that the telephone numbers of the family members of these
`specific individuals may also be blocked.
`Some current systems also limit the use of specific
`long-distance carriers. This feature proves useful in limiting
`unnecessary costs incurred by employing alternating carri
`erS.
`Several current systems utilize features commonly
`referred to as “flash hook” prevention or “click” and “pop”
`prevention modes. These systems prevent inmates from
`extending the current outgoing telephone call and entering a
`new telephone call with a new number without fully termi
`nating the original telephone call. For example, this prevents
`an inmate from utilizing common call forwarding features
`and the like.
`
`
`
`5
`In addition, some current institutional telephone systems
`electronically or manually disable the keypad after a tele
`phone number is dialed and the telephone call is connected.
`This feature prevents inmates from interacting with tele
`phone games and lotteries, and in certain older systems,
`prevents the inmate from achieving an unrestricted dial tone.
`Another common feature employed by institutional sys
`tems is three-way call prevention. This feature prevents an
`inmate from instructing the called party to bridge the tele
`phone call to another telephone number.
`Other known systems in the art may exhibit other regu
`latory features. For example, generally, telephone commu
`nication systems allow an institution to limit the duration of
`a telephone call and/or to limit the cost of the telephone call.
`These types of features further allow a facility to customize
`the telephone call systems thereby preventing unrecoverable
`expenditures.
`Another control used by current institution telephone
`systems is the use of certain aspects of biometric recognition
`for the identification of users or inmates (i.e., the calling
`party). However, systems known in the art have only used
`biometrics to a limited extent. It is highly beneficial for
`communication systems in penal institutions to incorporate
`biometrics as an additional security device. Biometric rec
`ognition is commonly available in a number of fields. For
`example, biometrics recognition has found a number of
`security uses, including common usage, in credit card sys
`tems and building security systems. Biometric information
`includes fingerprints, hand geometry, voiceprints, retinal
`patterns, iris scans, signatures, infrared facial patterns, and
`all other sources which constitute unique physiological
`characteristics and which can assist in establishing a per
`son’s identity. Various devices exist which can scan one or
`more biometric characteristics and digitize the information.
`The features discussed herein are present in several prior
`art references. For example, Hird, et al. U.S. Pat. No.
`4,890,317 discloses an automatic account number validation
`and billing management system. The system disclosed in
`Hird et al. prompts a user for an account number and
`compares the number inputted to a number stored in a
`database to determine validity. If the account number is valid
`and found in the database, the system completes the prede
`termined telephonic connection. If the number is not in the
`database, and therefore invalid, the system will utilize voice
`prompts to request re-entry of the number or provide further
`instructions. The system attempts to locally automate and
`simplify the process of payment for routing calls without
`live operator assistance, but does not address additional
`security concerns that may exist in specific facilities, such as
`in a penal institution. Furthermore, Hird et al. does not
`provide for protection measures to confirm that the indi
`vidual supplying the account number is the individual
`entitled to the use of the account. In such a hostile environ
`ment as in a penal institution, an account number may easily
`be obtainable through coercion or by force. Additionally, the
`system does not provide any means of monitoring the
`conversations taking place or restricting which individuals
`are accessed by the user.
`Kamil U.S. Pat. No. 4,706,275, discloses a call manage
`ment system enabling prepayment of telephone calls utiliz
`ing a debit system. Specifically, a user of the system obtains
`a special code by depositing a prepayment. The prepayment
`is stored in a database on the call management system for
`use in verifying calling party calls. To access the system, a
`user dials a special number and inputs a user-specific code
`for verification followed by the number of the party to be
`called. Next, the code is verified by the system. If verifica
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,333,798 B2
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`6
`tion is successful and sufficient funds are available, the call
`is connected. The prepayment amount, minus deductions for