throbber
(12)
`
`United States Patent
`Hodge
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,333,798 B2
`Feb. 19, 2008
`
`US007333798B2
`
`(54) TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`-
`75
`(75) Inventor: Stephen Lee Hodge, Aubrey, TX (US)
`-
`-
`- -
`(73) Assignee: Value Added Communications, Inc.,
`Plano, TX (US)
`-
`-
`- -
`-
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 442 days.
`
`sk
`-
`(*) Notice:
`
`(21) Appl. No.: 10/215,367
`
`(22) Filed:
`
`Aug. 8, 2002
`
`(65)
`
`Prior Publication Data
`
`|US 2004/0029564 A1
`
`Feb. 12, 2004
`
`(51) Int. Cl.
`H04Q 7/20
`
`(2006.01)
`
`(52) U.S. Cl. ................... assail, assalo. 379,9302
`379,142.05
`(58) Field of Classification Search ................ 455/410,
`455/411, 563,405, 406, 555, 560, 41.4.1,
`455/445, 55; 379/88.19, 88.02, 114,03, 265.01,
`379/142.1, 1422, 142.05, 142.06, 93.02;
`726/5: 713/169, 202; 380/247; 235/379
`See application file for complete search history.
`References Cited
`
`(56)
`
`|U.S. PATENT DOCUMENTS
`
`5,274,695 A * 12/1993 Green ..................... 379/88.02
`5,473,671 A * 12/1995 Partridge, III .............. 455/445
`5,485,507 A *
`1/1996 Brown et al. ...
`... 379/88.08
`5,502,759 A * 3/1996 Cheng et al. ...
`... 379/88.02
`5,655,013 A * 8/1997 Gainsboro .................. 379/188
`5,717,743 A * 2/1998 McMahan et al. .......... 379/188
`
`5,923,746 A * 7/1999 Baker et al. ........... 379/.265.02
`5,943,403 A * 8/1999 Richardson et al. ..... 379/88.26
`6,084,967 A * 7/2000 Kennedy et al. ............ 380/247
`6,104,922 A * 8/2000 Baumann ...
`... 455/410
`6,182,221 B1* 1/2001 Hsu et al. ...
`... 713/186
`6,213,391 B1 * 4/2001 Lewis ....
`... 235/380
`6,219,439 B1 * 4/2001 B
`- - -
`... 382/115
`6,282,566 B1* 8/2001 | "..." ... 709/217
`6,377,699 B1 * 4/2002 Musgrave et al. .......... 382/117
`6,389,397 B1 * 5/2002 Otto ........................... 704/270
`6,668,045 B1* 12/2003 Mow .........
`... 379/88.19
`6,687,733 B2 * 2/2004 Manukyan .................. 709/200
`6,819,219 B1* 11/2004 Bolle et al. ................ 340/5.52
`6,836,556 B1* 12/2004 Bromba et al. ............. 382/124
`6,950,508 B1* 9/2005 Griffiths ...........
`... 379/201.01
`2002/0042879 A1 * 4/2002 Gould et al. ................ 713/176
`2002/0177433 A1 * 1 1/2002 Bravo et al. ................ 455/411
`
`-
`
`FOREIGN PATENT DOCUMENTS
`2 148 569 A * 5/1985
`GB
`* cited by examiner
`-
`-
`-
`Primary Examiner—Jean Gelin
`y
`-
`(74) Attorney. Agent or Firm-Ward & Olivo
`(sº)
`ABSTRACT
`A secure telephone call management system is provided for
`authenticating users of a telephone system in an institutional
`facility. Authentication of the users of the telephone call
`management system is accomplished by using a personal
`identification number, biometric means, and/or radio fre
`quency means. The secure telephone call management sys
`tem includes accounting software capable of limiting access
`to the system based on funds in a user’s account or other
`related limitations. The system includes management soft
`ware capable of implementing widespread or local changes
`to the system and is further capable of modifying or setting
`any number of user account parameters.
`
`5 Claims, 36 Drawing Sheets
`
`
`
`
`
`
`
`Electronic
`* Switchboard
`
`
`
`|
`
`RF Receiver
`
`
`
`
`
`#|Biometric
`# Sensor
`
`
`
`-------------------------------- * * *-* *** ----------------------------,
`
`Admin.
`Workstation
`
`<-120
`
`Shadow
`Workstation
`
`
`
`:
`Investigative <!-
`Workstation
`125 :
`
`Commissary *— 121 :
`
`CMS (WAN)
`
`GTL 1005
`IPR of U.S. Patent No. 8,340,260
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 1 of 36
`
`US 7,333,798 B2
`
`0?I ?
`
`SZI ?
`
`IZI ? | Kuess!uuuuoO
`
`
`
`
`
`
`
`
`
`opny
`
`IBIJOS |
`
`I
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 2 of 36
`
`US 7,333,798 B2
`
`
`
`Fiaiil‘iiiiilEElli:i.
`
`PamEN
`
`Sm
`
`\U3%m
`
`35>
`
`_s‘ljom
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 3 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`IOZ
`
`QIS
`
`||(x,va | || 3 NoHa
`
`I IZ ?
`
`XO8IA) IS
`
`TORIJANOC) $Z
`
`'YICIOIV
`
`GIOIOOGICI
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 4 of 36
`
`US 7,333,798 B2
`
`
`
`HOODED_mzoy80ch
`
`
`
`.Gomn—
`
`m?
`
`Eom
`
`Sm:
`
`m?mmv
`
`moo:
`
`.AOm
`
`Ear—[G
`
`\mM—QZm
`
`mm>0m
`
`vfiuwx—U
`
`HUM—Hm:—
`
`Own—DAN
`
`><AEQH¢
`
`mNV
`
`wowwow
`
`
`
`
`
`Em
`
`.25a?
`
`SN
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 5 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`V LVCI
`
`QRIJACIJWOI8I
`
`RIGINNVOS
`
`

`

`U.S. Patent
`U.S. Patent
`
`9,1b.eF
`
`oo00
`
`S
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`2..................................................................................
`
`
`
`357501:03
`
`mmpm
`
`PM:Uv—HU“VHH.
`
`
`HEEox;25m
`
`How
`
`>\VEOBEZ
`
`
`
`
`
`
`
`
`
`6.oizoo58-43:qomazou25mKh.................................................................................
`
`6+m8m05372223—nmm<=m”5350mm
`
`
`:0/moo<m—\~UmnFE..................................................
`Evgout/50
`
`Mmmpm
`
`
`
`9 "?INH
`a.me
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 7 of 36
`
`US 7,333,798 B2
`
`
`
`
`ººk T*| L'Hoa owal
`JLRIVIT
`
`8 { {60
`

`
`|XHOVT | W3CIOW
`
`INIT
`
`
`
`WOO TVIRHTHS
`
`
`
`TIVO OTI
`
`TORIJLNIOC)
`
`SS[\{
`
`
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet8 0f36
`
`US 7,333,798 B2
`
`_Ev.UOMm
`
`HU~O>
`
`5956
`
`an“:
`
`><-m<
`
`vwmm
`
`FaggomuAImom
`
`”Hm—”EDM—Onflm2w
`
`mom
`
`
`
`093w
`
`F5252
`
`cm:
`
`Eém
`
`<H<Q
`
`w.UE
`
`
`
`lm;
`
`
`
`Joann/HODA<UOA
`
`mmDm
`
`3%
`
`......................................................................................................................................................................................................................................................................................................................................................................................................................................
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 9 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`/06 —>
`
`| 06 —>
`
`
`
`INOO TVIRIQIS
`
`SIRIO&H
`
`
`
`
`
`JANVYIS
`
`INGIAIINORI
`V JLWCIJAIGIIN
`
`
`
`É [69 [6
`
`TWOOT
`
`TOYHLNOC)
`
`SS[18I
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 10 of 36
`
`US 7,333,798 B2
`
`
`
`Lae aes ) ... , …,
`
`| || 0 ||
`
`

`

`be
`Feb. 19, 2008
`w
`
`F5:
`
`| 0 || ||
`
`U.S. Patent
`U.S. Patent
`
`
`
`co:
`00? ?
`
`m8:9.mt.
` ;.LkL.IImime-J?3.3.3...5—,.”4
`
`.Eywhw..gm...xii;:fin$3.3“.
`
`63f011t
`hS
`Sheet 11 of 36
`
`w8:
`
`90 I I
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`3.3%a.
`
`pmI
`
`:dam
`?INH
`
`.xx»:
`
`
`
`
`
`.M43,m‘n.,..‘1,4,2”;
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 12 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`LOZI
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ZI “?IH
`
`
`
`-* - * * • • •--------~--~~~~!------- ------~--~~~~--------------------------~--~~~~----+------------------~~~~~~~~|~~~~--~~~--~~~~
`
`;------?----+--------------------~--~#~####----------?+(––8
`
`***x=~~~---------
`
`

`

`US 7,333,798 B2
`US 7,333,798 B2
`
`ÇI "?INH
`
`U.S. Patent
`U.S. Patent
`
`
`
`1b.eF
`
`002
`
`S
`
`f031
`
`9,$2
`
`a:2
`
`32
`
`%2:
`
`m82
`8a:
`mcwmnufihaEEmuI. 8252co?
`
`3.5on55512
`
`
`
`22
`
`

`

`U.S. Patent
`
`9a1b.eF
`
`8m
`
`233
`
`Smoi
`
`63f041teeh
`
`US 7,333,798 B2
`
`:3mil
`
`_.n
`
` co:
`
`3%.?
`
`
`.flap?.9
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 15 of 36
`Sheet 15 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`1533
`
`1535
`
`1517
`
`FIG.15
`
`r~
`(\1
`a
`
`«3
`04mv—4
`
`
`
`151315151507
`
`1511
`
`V)
`c:Wr—1
`
`1500
`
`y E h
`
`E
`a:
`1:
`
`at
`.3
`fl,
`.—
`3M
`‘9;
`r
`$3
`
`w»
`V)
`o
`F.
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 16 of 36
`Sheet16 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`.1ll.75154111111!trlri15...:-
`.1111511
`
`”my«2,«my.-moJ.oz”.
`
`33%
`
`“or
`
`«.3.
`
`an}
`
`um}
`
`
`.311MHW.HM.H#..11.2.1hm}.
`mm}want
`3%mm?oz
`no}.no}02
`
`”war“
`
`
`
`1mg,Amman.
`
`3}an}02
`
`an}no}.02.
`
`9 I ’0IH
`
`
`
`mvfi,mvmwm
`
`83
`
`:3
`
`82
`
`002
`
`
`
`
`
`.33%.:Em.occsum_mh.u_m_=31
`
`+82
`
`111Flt-11.1.5
`£23:m111
`
`am}NSmmummnm
`
`
`
`.l...|.l|..lililll|zlitlkt
`
`3}mommmowmnm
`
`
`1”}.quSmmmomwnmtf.
`may“;mNN_.5mmB111.
`.1011’1‘1111111!II:1,
`
`infllis
`
`3;,Hm,r530.3
`all8}.mNPBmmmmm
`
`8}WmEmmmmmnm
`
`we,38538
`
`”myREES
`
`mew:
`
`22
`
`:2
`
`SS
`
`22
`
`mmww
`
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 17 of 36
`
`US 7,333,798 B2
`
`LI "OIDH
`
`gael ¿
`
`
`
`
`
`

`

`U.S. Patent
`
`000029,1b.eF
`
`63
`
`US 7,333,798 B2
`
`S36me
`
`M5&3?m8mg?
`Ml»wamfimrmwxmvmr
`
`gym?
`
`mevmv
`
`a.Emmfimtmmgg
`
`
`
`h.Emmydfififiam
`
`‘EmafinmH53SSEEh5.th.immwujam.wH5B.EEEEuEHfigfiam
`p3mm”
`
`EEE
`
`Egan:E8%
`
`555$
`
`883$
`
`38%
`
`
`
`0::
`
`com:
`
`mom:
`
`8M:2:SM:
`
`,Liiaikx,.lvltiglfin
`
`mafiagmEuzfiw3,1334
`
`.rE?:r...i
`
`3.UHH
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 19 of 36
`Sheet19 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`mama
`
`0061
`oomfi
`
`[06]
`Mama
`
`LE: ED.
`
`
`
`
`
`“haiku—H.mfi.m..:=—u:mm*flfin:fl1In
`
`6 I "?INH
`
`a.03
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb.19,2008
`
`Sheet20 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`
`xlrtrxlif
`
`“gnaw—3a.¥—3_mu..n>vmwI«.
`
`cm.UE—
`
`mmommmow
`
`28:238
`
`moon
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 21 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IZ “OICH
`
`IO IZ
`
`|
`
`LO IZ
`
`60 IZ
`
`9 || || Z.
`
`S I IZ
`
`

`

`U.S. Patent
`U.S. Patent
`
`
`
`Sheet 22 of 36
`
`Feb. 19, 2008
`mF
`
`m3%m83
`
`M8%
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`wUEEMnE,.
`
`nghagE23@255
`
`¿¿.*¿¿.….……………………
`
`3mm
`
`NN.Umm
`ZZ "?INH
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 23 of 36
`
`US 7,333,798 B2
`
`
`
`
`
`§§§§§§) Cae?ae!!!!!******** **
`
`009 Z
`
`%,
`
`
`
`S08%
`
`109 Z619 Z/ I £Z
`
`£Z “?INH
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb.19,2008
`
`Sheet24 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`2.
`s
`
`3
`s
`
`oovm
`
`3. rº)
`
`#Nwm
`
`mmvm
`
`mmwm
`
`nmvm
`
`§§
`
`
`
` r.,‘.rfilwsflg.u
`
`
`
`éflm‘wflw..
`
`33.3%flag.3
`
`mmwm
`
`mfivm
`
`Hmfim
`
`vm.UHm
`
`
`
`
`
`
`

`

`
`mafia.”mam.1mm$.93.an
`
`
`
`
`
`
`
`
`.“Ngislt$r$Exit...Ti...l;.....ila§.§.5§>5......»I...r....13.}...25.....6...........3...!.1...
`
`
`
`
`
`
`..‘...I.ll|ll.l.ittill).iilrilv.).(15.1.!.1.l..Ii..§Ili.l.\.€lr.1|.1.l.-ilv.l.ll.u33131.1.x\L...gamma“..
`
`..Hmm-Earn._1.1.1..a..a....zI..1.
`_..Nmm#83?
`
`
`.11....11:.LL..|..$1.1...ILlill.l...l.|{.LLKIIEE.Eybxerbtlili...ilk-l
`MNBdmmnw.
`311$}.Il.4ll.(.{f...(.lt...5..!.$.ix?-\e)..isia..\.§....l.vltlt§llnlrL1..
`
`
`.11I;...5511.ling»!!!1......I..|r.I..916.i.
`
`
`
`-------~--~~~#~~~~--~~~~|~~~~--~~~~--~--~~~~ ~~~~ ~~~~F-~~~~);~~~~ ~~~~
`
`
`
`
`
`
`
`.mmawmha.
`.$ENE
`
`:12.--£45..
`mmfimk...
`..If...)5....)1:34.111...momma
`
`
`
`.31...u....fv...11:A
`Bmmfi
`Eda”...
`
`8..figwwmfi
`
`........~».n.p:.41...».....
`
`mm.Umm
`SZ ’5)IDH
`
`.Bdme
`
`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 25 of 36
`Sheet 25 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`
`
`....
`
`
`
`
`
`
`
`.irriiirll‘iiléifblltt.lilriiz.‘.3.six‘avilIalio.g...32.2.!Stilt.1.\.01.5.3!ital........izsrilf...‘.....i.21l..lwlta5.
`
`
`!!-----------------------------------~--~~~~~--~~~~£75!!~~~(~~~~
`,amm.3...»
`
`
`
`.i..l;.l_lvl...1.5.2.1)...2-3.3.1.}...533......5.331.!!!.II..321....(...
`
`
`
`***-**********…*-----------------------------~--~~~~--~~~~~~ ~~~~ ~~~~.~~~~~--~~~~. --|------********* •••••••••••••
`
`
`
`
`
`
`
`..1..............................a.1.1..«311.4...E3.3.31.2...
`
`
`
`III-ELEIIII.1.....SL11-aix9.275-5.1r.1.¥:.ili.x.§lt.s.}lra<bL;{51.5.....i...M..Emma”.
`
`
`
`
`
`2..i..fataabgirilxnhixfiai.1.)}.1-T...
`
`
`
`
`
`8mm
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 26 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`:3!!!)
`
`
`
`303598.x.4...:v..2:.lll.|)l.-|.I:nvi.\llv£l.l.vul.l{I33.
`42..4.....
`
`
`3{1.113.}...flyk.z..i§l.l%Tul‘fll
`[33Emma,Qua”
`
`.23BEE
`
`.23has?8.33
`
`
`
`.35Emma“.3.3mm
`
`$3BE?88a:1...x$:!rr1¥..l+!;.;:!1..I!k5!);
`
`
`
`8 .m..33E5983ml“;
`
`w.
`«$14,454:. w
`
`.wm;
`
`'
`
`..
`
`x3
`
`n1.«-.‘.x“~‘r-.M,u.
`
`
`
`II‘l‘lallultit-aaénbt
`
`
`
`
`
`
`.mmamthmmmfiw.
`.3
`
`Com2mmgcom
`mcm:8$8883888
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 27 of 36
`Sheet27 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`,m...._,
`'7 ‘6'“ \m.
`
`__
`r
`,
`3 ‘ saxwflufiiu.
`
`n
`
`6 I LZ
`
`S.
`

`
`-
`
`
`
`
`
`~~~~ ~~~~,~*
`
`mmdw
`5N.Umm
`
`
`LZ “?IH
`
`50.8monmSum
`
`
`
`
`
`.‘t
`
`
`' «firm 5 ilk-‘35:»WA».EW‘WHF.53?“
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 28 of 36
`
`US 7,333,798 B2
`
`
`
`008Z
`
`?I 87
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 29 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`2929
`
`FIG.29
`6Z “OICH
`
`2900
`
`2921
`
`2915
`
`2913
`
`2911
`
`2901
`
`

`

`U.S. Patent
`U.S. Patent
`
`01,,
`
`00m
`
`hS
`
`f003t
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`mmmmom
`
`cm.Umm
`
`09 *5) I H
`
`Hoom
`
`moom
`
`moom
`
`meow
`
`mfiom
`
`hfiom
`
`b.33
`9‘poem
`“wmfiom
`%fifiOm
`
`
`
`
`
`
`«mafia—emuIAll!ooom
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb. 19, 2008
`
`Sheet 31 of 36
`Sheet 31 of 36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`,«4.x.
`
`‘.memmmmmra
`
`.w,
`
`_H_m 2.3amine.»
`
`“5::
`
`
`
`w.
`
`_qflw§§nfifififi
`.,4m,
`
`in...»
`
`Hm.UHm
`I º ‘‘DIH
`
`| I || 9
`
`oofim
`
`4/8:
`
`5.92..#5.
`
`[0][9]
`Hofim
`
`mofim
`
`mofim
`
`hc_m
`
`

`

`U.S. Patent
`U.S. Patent
`
`. 19, 2008
`Feb
`Feb
`.19,2008
`
`Sheet 32 of 36
`Sheet32 0f36
`
`333,798 B2
`US 7
`9US7
`333,798 B2
`9
`
`
`
`mzfimumfixmhwfl comm
`
`
`
`
`
`050a.«mannammmomomo
`
`
`
`Guamanaghvvvomomo
`
`
`
`hmmstuZHhmM—aNNNomomo
`
`
`
`
`
`mamammHAquflHoaommmo
`
`
`
`moqdbdMoonnadommmo
`
`
`
`MubmaoquHBHoaommmo
`
`
`
`933memoaommmo
`
`mm.0:—
`
`Z9 °5) I H
`
`moaommmo
`
`wadommma
`
`.xl;
`
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 33 of 36
`
`US 7,333,798 B2
`
`
`
`I
`-- - - - - - - - - - - - - - - - -
`
`$ $ "OIH
`
`9.134.385$ : I 5 : 80 0002/0?A’T I T T T 06060
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Feb. 19, 2008
`Feb.19,2008
`
`Sheet 34 of 36
`Sheet34 0f36
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`
`
`
`
`HovM
`
`um.UHm
`
`

`

`U.S. Patent
`
`Feb. 19, 2008
`
`Sheet 35 of 36
`
`US 7,333,798 B2
`
`6 IS £
`
`
`
`H SITIÐ ÞIGI
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`F
`
`1
`
`00
`
`63a
`
`US 7,333,798 B2
`US 7,333,798 B2
`
`9,ceramic?
`
`m538.0%
`
`m5:38:03550m85
`
`goumgm3.55035m8309
`
`matomL\2HomCOHwoofim
`
`./Ewsfiam
`
`92%£20
`(NVA) SWO
`
`
`
`
`%m2Iv8:89:85Mgumwumgfi
`
`.H
`
`cm.UE
`99 "?INH
`
`030805
`
`mammcom
`
`8qu
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`US 7,333,798 B2
`
`1
`TELECOMMUNICATION CALL
`MANAGEMENT AND MONITORING
`SYSTEM
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of
`telephone communication systems in penal institutions or
`similar facilities. In particular, the present invention relates
`to a computer-based telecommunication system with the
`capacity to allow an institution to control, record, monitor,
`and report usage and access to a telephone network.
`
`BACKGROUND OF THE PRESENT
`INVENTION
`
`10
`
`15
`
`2
`system, inmates have often harassed outside parties or
`individuals. For example, it is generally preferred that an
`inmate should not be able to place a telephone call to the
`prosecutor who prosecuted the inmate’s case or another
`attorney responsible for the sentencing of the inmate. In
`another example, it may be preferred that an inmate be
`prevented from contacting the victim of the inmate’s crime
`or witnesses from the inmate’s case. It has also been
`documented that inmates have used previous penal institu
`tion call systems to perpetrate additional criminal activities
`such as fraudulent schemes or specific criminal conspiracies.
`Specifically, inmates have been known to arrange credit card
`fraud attempts, the smuggling of contraband into the facility,
`and have even been known to arrange escape attempts over
`the penal institution’s telephone system. Therefore, it is
`critical in an efficient penal institution to carefully monitor
`all outgoing telephone calls making a regulated penal insti
`tution telephone system a necessity.
`Another concern in implementing an efficient institution
`telephone system is cost control. In order for a system to be
`cost effective the system must critically monitor and record
`the activities of each individual user to properly charge each
`individual caller for his or her outgoing calls. Typically,
`telephone communication systems in penal institutions pro
`vide an inmate with a telephone account upon arrival. Each
`individual receives an account number. There are several
`options for an inmate to select with respect to payment on
`the account. For example, an inmate may place prior per
`sonal earnings into the account. The cost of each call is then
`deducted from the total amount in the inmate’s account until
`no balance remains. The inmate may choose to utilize collect
`call means. In addition, or alternatively, an inmate may be
`assigned a commissary account, where funds are added to
`the account based on work performed by the inmate. As the
`funds increase, the inmate may apply these funds to the cost
`of placing telephone calls. The inmate debit account may be
`located onsite, at a central office facility, or at a third-party
`site.
`The inmate debit account may alternatively be controlled
`by the inmate’s family. For example, the inmate’s family
`may control the inmate’s access to the debit account either
`remotely (e.g., by using the Internet, accessing a toll-free/
`pay to dial telephone number, using a mail form, etc.) or by
`visiting the prison facility. The inmate’s family may add
`funds to the debit account and thereby control the call
`volume allowed to the inmate.
`Another requirement of a secure telephone management
`system in a penal institution is the accurate identification of
`the telephone call participants. Generally, it is common in a
`penal institution to assign each inmate a personal identifi
`cation number (PIN). When an inmate attempts to place a
`telephone call, the inmate must supply a valid PIN to gain
`access to the telephone system. However, a primary problem
`with this identification method is the ease of obtaining
`another inmate’s PIN. For example, individuals who com
`monly forget their PIN may write it down, increasing the
`possibility that an unauthorized individual will view the PIN
`and use it. In addition, if a PIN number is compromised and
`utilized by an unauthorized inmate, the unauthorized inmate
`may then be able to call certain individuals who are
`restricted to that inmate, since the unauthorized inmate is no
`longer using the proper PIN associated with that inmate. In
`known systems, the PIN identification method is incapable
`of verifying that the individual who supplies the PIN is the
`actual specified inmate. Some systems have attempted to
`improve security by requiring the use of a debit card in
`conjunction with a PIN. The use of the debit card will only
`
`Generally, the need to monitor, control, record and pro
`vide detailed records of the usage of a telephone system in
`a controlled institutional environment is well recognized. It
`is common to utilize a controlled telephone system capable
`of monitoring outgoing telephone connections in many
`types of institutional environments, such as, but not limited
`to, penal institutions, military institutions, hospitals, schools,
`businesses, or specific types of government institutions. The
`reasons for monitoring and controlling institutional tele
`phone systems are evident. To prevent such institutions from
`incurring unaccountable telephone costs, the institutions
`must either restrict access to outbound telephone lines or
`employ a telephone monitoring system to charge the respon
`sible party for making the outbound communication. Oth
`erwise, unaccountable telephone costs would severally
`hinder the availability of the telephone systems in institu
`tions.
`Therefore, it is imperative for many institutions to utilize
`a communication system that provides an accurate identifi
`cation means for administrators to determine the individual
`responsible for each outbound telephone call. A communi
`cation system must also provide a monitoring means for
`maintaining a useful record of the communication. Addi
`tionally, the system may include a means for restricting
`access or a means for providing options to particular users.
`Considering the number of users in a large institution,
`different payment methods available, and the excessive call
`volume at many institutions, it is evident that an effective
`telephone management system is essential.
`Providing telephone systems in specific types of highly
`restricted institutions, such as in penal institutions, results in
`the consideration of numerous additional complicating fac
`tors. Generally, outbound communication means in penal
`institutions are heavily regulated by the government. There
`fore, communication systems implemented in penal institu
`tions or similar facilities must meet greater security require
`ments often mandated by regulatory bodies affiliated with
`the county, state, or federal institution. Thus, the communi
`cation system used in a regulated institution must employ
`unique functions often unnecessary in other types of insti
`tutions.
`In its most general form, a penal institution’s telephone
`system utilizes a call processor to approve and place a call,
`surveillance equipment or monitoring equipment, and a
`recording device for evidencing the conversation. Generally,
`these simple systems are not equipped to restrict an inmate
`from calling any individual. However, it is preferable for the
`call system devices now employed in such institutions to
`have the capability to thwart an inmate from calling certain
`specific individuals or types of individuals. Without the
`necessary constraints on an inmate’s use of the telephone
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`

`

`US 7,333,798 B2
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`3
`allow access to an inmate’s account if the correct associated
`PIN is supplied. This method, however, provides only mini
`mal additional protection because a debit card and its
`associated PIN can often, with or without force, easily be
`taken from another inmate, or given to another inmate,
`especially in the violent atmosphere of a penal institution.
`For example, one inmate may threaten another inmate in
`order to obtain such information. Alternatively, one inmate
`may provide certain services in exchange for the use of
`another inmate’s telephone privileges. The possibility that
`two inmates will exchange accounts also exists, thereby
`allowing them to contact people that would normally be
`restricted to them.
`Further attempts to obviate security concerns include
`requiring personal information, in addition to a PIN, to be
`supplied by the inmate/user. For example, a user might be
`prompted to supply a PIN as well as certain information that
`may only be known to the user. A common example is a
`request by the call system to provide their mother’s maiden
`name. This provides an additional security measure, but
`again is minimally secure because such information can
`easily be obtained in a correctional facility. It would there
`fore be desirable to develop a telephone management system
`that incorporates an improved method of identification and/
`or verification.
`Another required feature of a telephone management
`system for a penal institution or similar facility is a means
`for restricting calls placed by a user (e.g., an inmate). It is
`well documented that inmates often try to harass individuals
`related to their arrest or confinement, such as judges, pros
`ecutors or witnesses, etc., through telephonic communica
`tions. Penal institutions have attempted to prevent this by
`restricting the telephone numbers each inmate is able to
`access. For example, a system may utilize a PIN or other
`identification means to access a list of telephone numbers
`that the inmate may not call, or alternatively, the system may
`access a list of numbers that the inmate is authorized to
`connect to (i.e., the inmate can only call the numbers
`appearing on the list). Telephone numbers placed on the
`restricted list can include any individual related to the
`conviction (e.g., the arresting police officer, the prosecuting
`attorney, etc.), while telephone numbers placed on the
`permitted list may be, for example, close family relatives.
`The system may also limit the amount of time each inmate/
`user is permitted to conduct each outbound telephone call
`through the system. Furthermore, restrictions may be regu
`larly updated. For example, if an inmate misbehaves, the
`inmate’s telephone privileges may be further limited or
`revoked completely.
`Penal institutions are also concerned with monitoring the
`activities and communications of inmates. Monitoring tele
`phone activities is necessary to restrict connections to illegal
`activities outside of the institution.
`Three existing types of call monitoring techniques are
`known in the art. The first technique is live monitoring. Live
`monitoring requires an operator or other individual to listen
`to each telephone call and alert the proper authorities if
`necessary.
`The second type of monitoring involves recording the
`telephone conversation via a common recording device. A
`60
`common example of this is a recording device such as a
`magnetic tape drive. This type of monitoring may be con
`tinuous or intermittent depending on the degree of security
`required for each inmate.
`The third type of monitoring is known as passive moni
`toring. Passive monitoring may be activated when certain
`keywords are spoken. In addition, passive monitoring may
`
`45
`
`50
`
`55
`
`65
`
`4
`be activated if the telephone call at the termination end is
`transferred to a third party via certain known detection
`means such as “click and pop” detection, etc.
`Penal institutions currently record most inmate telephone
`calls, with the exception of lawyer-inmate communications
`which are generally prohibited by law. Typically in the art,
`monitoring may occur using any combination of the three
`methods (e.g., live monitoring, electronic recording moni
`toring, or passive monitoring). However, it would be desir
`able for a telephone management system to embody a means
`for determining which level of telephone monitoring should
`be employed for each telephone call. For example, it would
`be advantageous to flag certain individuals in an inmate’s
`profile as highly suspicious. If the inmate initiates commu
`nication with the flagged individual, the system will alert a
`live operator to monitor the system. In such a system it is
`essential that the system correctly identify the called indi
`vidual to avoid unnecessary expenditure of live operators.
`Alternatively, the inmate telephone call system may uti
`lize a remote alert notification system wherein the system
`contacts an operator when a violation has occurred. The
`system may contact the operator utilizing telephone means,
`paging means, etc. This notification system may be set to
`call the operator a limited number of times or until the alert
`has been noted in the inmate telephone call system. The
`operator may then access information about the alert
`remotely using the telephone, Internet, or any other such
`remote access means.
`In order to alleviate some of the problems and concerns
`discussed herein, many penal institutions have implemented
`certain task-specific advanced systems. Generally, these
`“advanced” systems known in the art comprise several
`features.
`For example, it is known in current systems to employ
`permanent call blocking. Specifically, it is known in the art
`to block an inmate or group of inmates from dialing certain
`telephone numbers. Most systems also prevent inmates from
`talking directly to live operators. This prevents inmates from
`requesting that the operator forward a call or provide addi
`tional telephone numbers allowing the inmates to harass or
`locate additional parties. Furthermore, current systems block
`“1-800,” “1-900” and other like telephone numbers includ
`ing toll-free and pay-to-dial telephone numbers. In addition
`certain institutions may elect to block country codes, spe
`cific area codes, or other third-party numbers.
`Current systems known in the art may also utilize a
`feature commonly referred to as “selective” call blocking.
`As discussed, “selective” call blocking may be employed to
`thwart inmates from establishing a connection with a
`selected group of individuals (i.e., with the home telephone
`of prison guards, wardens, indictment witnesses, trial wit
`nesses, police officers, judges, etc.). It is also foreseeable
`that the telephone numbers of the family members of these
`specific individuals may also be blocked.
`Some current systems also limit the use of specific
`long-distance carriers. This feature proves useful in limiting
`unnecessary costs incurred by employing alternating carri
`erS.
`Several current systems utilize features commonly
`referred to as “flash hook” prevention or “click” and “pop”
`prevention modes. These systems prevent inmates from
`extending the current outgoing telephone call and entering a
`new telephone call with a new number without fully termi
`nating the original telephone call. For example, this prevents
`an inmate from utilizing common call forwarding features
`and the like.
`
`

`

`5
`In addition, some current institutional telephone systems
`electronically or manually disable the keypad after a tele
`phone number is dialed and the telephone call is connected.
`This feature prevents inmates from interacting with tele
`phone games and lotteries, and in certain older systems,
`prevents the inmate from achieving an unrestricted dial tone.
`Another common feature employed by institutional sys
`tems is three-way call prevention. This feature prevents an
`inmate from instructing the called party to bridge the tele
`phone call to another telephone number.
`Other known systems in the art may exhibit other regu
`latory features. For example, generally, telephone commu
`nication systems allow an institution to limit the duration of
`a telephone call and/or to limit the cost of the telephone call.
`These types of features further allow a facility to customize
`the telephone call systems thereby preventing unrecoverable
`expenditures.
`Another control used by current institution telephone
`systems is the use of certain aspects of biometric recognition
`for the identification of users or inmates (i.e., the calling
`party). However, systems known in the art have only used
`biometrics to a limited extent. It is highly beneficial for
`communication systems in penal institutions to incorporate
`biometrics as an additional security device. Biometric rec
`ognition is commonly available in a number of fields. For
`example, biometrics recognition has found a number of
`security uses, including common usage, in credit card sys
`tems and building security systems. Biometric information
`includes fingerprints, hand geometry, voiceprints, retinal
`patterns, iris scans, signatures, infrared facial patterns, and
`all other sources which constitute unique physiological
`characteristics and which can assist in establishing a per
`son’s identity. Various devices exist which can scan one or
`more biometric characteristics and digitize the information.
`The features discussed herein are present in several prior
`art references. For example, Hird, et al. U.S. Pat. No.
`4,890,317 discloses an automatic account number validation
`and billing management system. The system disclosed in
`Hird et al. prompts a user for an account number and
`compares the number inputted to a number stored in a
`database to determine validity. If the account number is valid
`and found in the database, the system completes the prede
`termined telephonic connection. If the number is not in the
`database, and therefore invalid, the system will utilize voice
`prompts to request re-entry of the number or provide further
`instructions. The system attempts to locally automate and
`simplify the process of payment for routing calls without
`live operator assistance, but does not address additional
`security concerns that may exist in specific facilities, such as
`in a penal institution. Furthermore, Hird et al. does not
`provide for protection measures to confirm that the indi
`vidual supplying the account number is the individual
`entitled to the use of the account. In such a hostile environ
`ment as in a penal institution, an account number may easily
`be obtainable through coercion or by force. Additionally, the
`system does not provide any means of monitoring the
`conversations taking place or restricting which individuals
`are accessed by the user.
`Kamil U.S. Pat. No. 4,706,275, discloses a call manage
`ment system enabling prepayment of telephone calls utiliz
`ing a debit system. Specifically, a user of the system obtains
`a special code by depositing a prepayment. The prepayment
`is stored in a database on the call management system for
`use in verifying calling party calls. To access the system, a
`user dials a special number and inputs a user-specific code
`for verification followed by the number of the party to be
`called. Next, the code is verified by the system. If verifica
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 7,333,798 B2
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`6
`tion is successful and sufficient funds are available, the call
`is connected. The prepayment amount, minus deductions for

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket