`Apple et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,031,849 B1
`Oct. 4, 2011
`
`US008031849B1
`
`(54) TELEPHONY SYSTEMAND METHOD WITH
`ENHANCED FRAUD CONTROL
`
`(75) Inventors: Wesley Larry Apple. Archdale, NC
`(US); Timothy Edwin Pabon,
`Greensboro, NC (US)
`
`1/1989 Daudelin
`4,797,910 A
`4,890,317 A 12/1989 Hird et al.
`4,908,852 A
`3/1990 Hird et al.
`4,922,519 A
`5/1990 Daudelin
`4,933,965 A
`6/1990 Hird et al.
`4,933,966 A
`6/1990 Hird et al.
`4,935,956 A
`6/1990 Hellwarth et al.
`4,993,062 A
`2/1991 Dula
`-
`-
`5,048,079 A
`9/1991 Harrington et al.
`
`(73) Assignee: * 5,093,858. A 3/1992 Hird et al.
`s
`s
`5,113,433 A
`5/1992 Hird et al.
`- -
`5,131,027 A
`7/1992 Hird et al.
`-
`-
`-
`Subject to any disclaimer, the term of this
`5,159,698 A 10/1992 Harrington et al.
`patent is extended or adjusted under 35
`Continued
`U.S.C. 154(b) by 1736 days.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`1 388 997 A1
`2/2004
`(Continued)
`OTHER PUBLICATIONS
`Arons, Barry,"SpeechSkimmer: A System for Interactively Skim
`ming Recorded Speech,” ACM Transactions on Computer-Human
`Interaction, vol. 4, No. 1, Mar. 1997, pp. 3-38.
`-
`(Continued)
`-
`-
`-
`-
`-
`-
`Primary Examiner – Binh Tieu
`(74) Attorney, Agent, or Firm – Kilpatrick Townsend &
`Stockton, LLP
`
`-
`(*) Notice:
`
`(21) Appl. No.: 11/219,570
`(22) Filed:
`Sep. 2, 2005
`Related U.S. Application Data
`(60) Provisional application No. 60/607,447, filed on Sep.
`3, 2004, provisional application No. 60/676.155. filed
`on Apr. 29, 2005, provisional application No.
`60/676,153, filed on Apr. 29, 2005, provisional
`application No. 60/676,151, filed on Apr. 29, 2005,
`provisional application No. 60/676,154, filed on Apr.
`29, 2005, provisional application No. 60/676,152,
`filed on Apr. 29, 2005.
`
`(51) Int. Cl.
`(2006.01)
`H04M 15/06)
`(2006.01)
`H04M H 7/00
`(52) U.S. Cl. .............. 379/145; 379/114.14; 379/11403;
`704/273; 704/274
`(58) Field of Classification Search ............. 379/114.14,
`379/143, 144,03, 188, 145; 704/208, 210,
`704/216, 217, 218, 231, 236, 237,251, 273,
`704/274
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`|U.S. PATENT DOCUMENTS
`4,054,756 A 10/1977 Comella et al.
`4,339,385 A * 7/1982 Burri ............................. 548/409
`
`EP
`
`ABSTRACT
`(57)
`Inmate communications systems provide a feature-rich plat
`form with a high degree offlexibility and security employing
`call control facilities located off institutional premises.
`Authentication processes for calling and called party verifi
`cation include biometric techniques in some embodiments.
`Distributed processing of call control and billing provide
`flexible interactive call payment processes. Preferred
`embodiments feature voice over IP transmission and control
`featuring controlled access to avoid addition of unauthorized
`third-party call participants. Monitoring, recording and selec
`tive forwarding of calls is provided under control of system
`administrators.
`
`20 Claims, 19 Drawing Sheets
`
`YES
`
`PROMPT:
`USER ID:
`
`PRößlpt:
`PASSWORD
`
`WERIFY;
`AuTHENTICATE
`£ALLER
`
`r- -F º ºr -
`1988]... 1.- Tian
`lwallpation
`
`| Waibaron
`
`PLACE CALL,
`&NNoUNCE
`CALLER &
`FREE CALL
`fºLAN on ANS,
`
`
`
`ANNoUNCE:
`CALLEty; Nor
`ALLøWEd
`
`PuT CALLER
`of HøLd
`
`YES
`
`#PLACE CALL
`to cal-LED #
`
`ANNou NCE
`CALL &
`cALLING PTY
`on ANSWER
`
`
`
`c3R to
`CALLET)
`PARTY
`
`1173
`
`1474
`PLACE CALL,
`ANNou NCE
`£ALLER &
`FREE CALE.
`PLAN ºf ÅM3.
`
`proßpt:
`AccEPtoR
`teNY code
`
`PARTY
`
`1:23
`
`coºleNºte
`CALL TIMING
`
`1328
`
`DETECT
`HANGiºf ort
`TIMEºut
`
`1728
`
`1160
`connect cºsR
`to C?lied
`PARTY
`
`1854
`
`GTL 1021
`IPR of U.S. Patent No. 8,340,260
`
`
`
`5
`
`5
`
`|U.S. PATENT DOCUMENTS
`-
`sº. A gº ºn. 379/88.02
`52- :
`* *
`:-> “… .
`5.319,701 A
`6/1994 Hird et al.
`5.319,702 A
`6/1994 Kitchin et al.
`5,351,290 A
`9/1994 Naeini et al.
`5,414.755 A +
`5/1995 Bahler et al. -- . . . . . . . . . . . . 379/88.02
`5,483,581. A
`1/1996 Hird et al.
`5.535.261 A
`7/1996 Brown et al.
`5,539,812 A
`7/1996 Kitchin et al.
`5,602,900 A * 2/1997 Hattori .......................... 455/566
`5,623,539 A * 4/1997 Bassenyemukasa
`et al. … 379/88.02
`81997 Gainsboro
`5,655,013 A
`5,729,741. A
`3/1998 Liaguno et al.
`5,768,355. A
`6/1998 Salibrici et al.
`5,781,611 A * 7/1998 Park ........................... 379/32.04
`5,796,811 A
`8/1998 McFarlen
`::::::: * }; §. al
`5,867,494 A
`2/1999 Krishnaswamy et al.
`5,926,533 A
`7/1999 Gainsboro
`5.960,072 A
`9/1999 Hird et al.
`6,064,963 A
`5/2000 Gainsboro
`6,141,406 A,
`10/2000 Johnson
`6,185,527 B1
`2/2001 Petkovic et al.
`6,336,090 B1
`1/2002 Chou et al.
`6,434,520 B1
`8/2002 Kanevsky et al.
`6,480,825 B1
`11/2002 Sharma et al.
`6,542,869 B1
`4/2003 Foote
`6,560,323 B2
`5/2003 Gainsboro
`6,611,583 B1
`8/2003 Gainsboro
`6,636,504 B1 10/2003 Albers et al.
`6,639,977 B1 102003 Swope et al.
`6,639,978 B2 10/2003 Draizin et al.
`6,647,096 B1 11/2003 Milliorn et al.
`6,665,376 B1 12/2003 Brown et al.
`6,665,380 B1
`12/2003 Cree et al.
`6,668,045 B1 12/2003 Mow
`6,760,701 B2
`7/2004 Sharma et al.
`6,763,099 B1
`7/2004 Blink
`6,795,540 B1
`9/2004 Mow
`6,804,331 B1
`10/2004 Vacek et al.
`6,836,540 B2 12/2004 Falcone et al.
`6.842,447 B1
`1/2005 Cannon
`6'895,086 B2
`5/2005 Martin
`6,898,277 B1
`5/2005 Meteer et al.
`6,920,209 B1
`7/2005 Gainsboro
`7,013,002 B2
`3/2006 Link et al.
`7,042,992 B1
`5/2006 Falcone et al.
`7,136,817 B2 * 1 1/2006 Schroder et al. .............. 704/275
`7,158,621 B2
`1/2007 Bayne
`7,403,766 B2 * 7/2008 Hodge .......................... 455/411
`7,494,061 B2
`2/2009 Reinhold
`
`.
`
`US 8,031,849 B1
`Page 2
`
`3/2009 Spadaro et al.
`7,505,406 B1
`5/2009 Rae et al.
`7,529,357 B1
`7,778,832 B2 * 8/2010 Broman et al. ............... 704/246
`2001/0036297 A1 11/2001 Ikegami et al.
`2001/0036821 A1 1 1/2001 Gainsboro et al.
`2001/0043697 A1 1 1/2001 Cox et al.
`2002/0120756 A1
`8/2002 Lynam et al.
`2002/0126626 A1
`9/2002 Singh et al.
`2002/0168060 A1 1 1/2002 Huie
`2003/0009333 A1
`1/2003 Sharma et al.
`2003/0034423 A1
`2/2003 Hess et al.
`2003/0035523 A1
`2/2003 Mansfield
`2003/009 1046 A1
`5/2003 Fang et al.
`2003/0126470 A1
`7/2003 Crites et al.
`2003/0138084 A1
`7/2003 Lynam et al.
`2003/0200182 A1 10/2003 Truitt et al.
`2004/0022380 A1
`2/2004 Lynam et al.
`2004/0029564 A1
`2/2004 Hodge
`2004/0190702 A1
`9/2004 Mayer et al.
`2005/0018828 A1
`1/2005 Nierhaus et al.
`:::::::::::: A. § º * 455/411
`2005/0.141678 A1
`6/2005 Anders
`2005/0190.902 A1
`9/2005 Benco et al.
`2005/0283475 A1 12/2005 Beranek et al.
`2006/0188077 A1* 8/2006 Susen et al. .............. 379/114,01
`2006/02856.50 A1 12/2006 Hodge
`2009/0046841 A1* 2/2009 Hodge .......................... 379/189
`FOREIGN PATENT DOCUMENTS
`WO 00/76.158 A1 12/2000
`
`:};
`
`WO
`
`OTHER PUBLICATIONS
`Alon, Guy, “Key-Word Spotting—The Base Technology for Speech
`Analytics.” http://
`lectronics-2000.com/i
`/aardvark/k
`ytics,
`tp: www.electronicS-
`.CO Images aardvar WS.
`pdf, Jul. 2005, pp. 1-8.
`Dharanipragada, S., “A Fast Vocabulary Independent Algorithm for
`Spotting Words in Speech.”Acoustics,Speech,and Signal Process
`ing,’98 IEEE IN.Conf, V. 1, May’98,pp. 233-236.
`Johnson, Charles E., “New Technology Is Creating Improvements in
`the Corrections Field,” Corrections Today, Jul. 2005, pp. 62-64.
`Leavitt, Neal, “Let’s Hear It for Audio Mining.” IEEE Comp., Oct.
`2002, pp. 23-25
`4. Pp. 32.4°.
`-
`-
`. . . .22
`-
`Pfeiffer, Silvia, Automatic Audio Content Analysis, Proceedings of
`the fourth ACM International Conference on Multimedia, Feb. 1997,
`pp. 21-30.
`- X-
`- -
`-
`Wold, Erling, “Content-Based Classification, Search, and Retrieval
`of Audio.” Multimedia, IEEE vol. 3, Issue 3, Fall 1996, pp. 27-36.
`Sulkin, Allan, PBX Systems for IP Telephone, McGraw-Hill, 2002,
`pp. 183-202.
`* cited by examiner
`
`
`
`U.S. Patent
`
`US 8,031,849 B1
`
`
`
`
`
`
`
`001,
`
`
`
`EINOH«HETE).E NOHdBITEL
`
`soNITIVO
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 2 of 19
`
`US 8,031,849 B1
`
`mzoznmdh/2...SN
`
`<._.<D-m_zOIn_wn_m._.
`
`
`
`szIame...szInfiJmh
`
`0234<U
`
`oou
`
`
`
`mw<m<k<n......
`
`QWJ4<U
`
`mZOIQNJMH
`
`mesz
`
`wo<u_~._w._.z_
`
`<53
`
`xmozfimz
`
`:03
`
`5.255.
`
`
`
`OZEWMOOKQn=O>
`
`._<ZO_._.Om¢xOO
`
`>._._.=U<u_
`
`..mimozcmzN0Emp<>_m&o:m:n_
`
`hmxoci
`
`3330sz
`
`
`
`
`
`U.S. Patent
`
`tcO
`
`91
`
`US 8,031,849 B1
`
`M35352.
`
`mmNN
`
`:8w5205on<%9wvI.I.33Mwv1AmummmzAm.352,n._o>4.«S
`3xmozfimz.2255»
`
`
`
`AVMELVS
`
`>zOIn_m._m._.
`
`1023.0:
`
`mNN
`
`
`
`aha:..0.m
`
`.
`
`AVMElVE)
`
`hm¥0<m
`
`meEmz
`
`w0<uEth_
`
`z_s_D<
`
`._<z_s_mm._.
`
`run
`
`mm.0...—
`
`w
`r
`n
`
`<n.0."—
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`2
`
`f
`
`US 8,031,849 B1
`
`can
`
`
`cmohompmo5.02520mozm.__m555.
`mmofimmpz.
`
`xnwun
`
`wron
`
`
`
`>zo:.m:m»1nnnnnnnn.m._.<0:Otgm02.1.1.5mn=o>
`
`
`
`
`
`w3"
`
`
`o.55280253005
`
` €2.5545.025220:81:008:Ew9:23mumw.aaMas”wv
`
`A«mama:at.6.5zo:<o_u__¢m>
`
`.A
`
`mom
`
`._.zmEOZDOZ<
`
`mmOhw
`
`amomoomm
`
`Hzm2m02302<
`
`domhzoo
`
`0n.0."—
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet50f19
`
`US 8,031,849 B1
`
`v
`NV
`
`«NV
`
`Oz
`
`a;u_._<0mojn
`
`aom....<oO...
`
`a:
`
`moz:Ozz<
`
`1:46
`
`E«.233
`
`owe
`
`"kn—.2011
`
`KOhum00<
`
`WOOD>zwo
`
`
`
` ._._<08:muzmssoo
`
`02345
`
`mm>
`
`
`
`wNvhemhwo
`
`g.an502<z
`
`v;
`
`nmuzzOzz<
`
`._.Oz%Dual—<0
`
`DEED-34‘
`
`2?"has—ONE
`
`D.«Em:
`
`mw>
`
`8v”has—01A
`
`anSmmSu
`
`as>n=mw>
`
`¢m44<0
`
`"has—Omn—
`
`#Dw44<0
`
`v.0."—
`
`Zulj<0ban.
`
`01.0:20
`
`¢o
`
`o
`
`._.N_<._.m
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Lc
`
`1
`
`US 8,031,849 B1
`
`
`
`OmzoEmdp3..
`
`t3553Moe.....ve.Ah-s_
`6axoz_._.__m
`
`a_._<zoFoum¢oo4325m25“.
`cu._.1m:uan.
`.n_IIIIIIIIImoF.5>565.
`
`«3
`
`8“3220.59
`
`:53
`
`A<Z=2¢WP
`
`
`
`MZOInmnfi...szIEWAm...
`
`Uz_Jn_<0
`
`can
`
`m_m—:otzmE?Wlm3
`
`
`
` 3:_na:._92:oz_mmmoomaHon._920.55.60
`
`0w.._.mnsmzoz<oEEm>
`
`mzoxamdp_8.35
`
`m.mV—u—35.82sz_$3553.52
`3425:0ij5:93
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet70f19
`
`US 8,031,849 B1
`
`.....
`
`mm<m<h<o
`
`8.
`
`wZOImmdm...
`
`
`
` o:E:U._._>>mZEmn.
`
`mt.“
`
`c3.
`
`z=>_o<
`
`._<z_mmh
`
`58
`
`
`
`szImmgmhszIQNJNP
`
`023.20
`
`
`
`mar.car
`
`
`
`m2.J<zo_h0mm¢00
`
`t3_0<u
`
`Dm44<0
`
`szIn—mn—m...
`
`our
`
`mm
`
`
`m—IO._._>>wZhwm
`wlm|9;
`
`
`
`mmxm.mgxmozcmz
`
`wh<>En=03mDm
`
`
`
`02-mmmuommmo...mom
`
`«.055
`
`‘zOFONIEOO
`
`02:45
`
`zo_h<o_u_mm>
`
`5.on
`
`Amimozcmz
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 8 of 19
`
`US 8,031,849 B1
`
`W-001Z-001|--002
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 9 of 19
`
`USSJB1349B1
`
`
`mm<m<h<o....._:mozfimz
`4E3-67.5252_5:05_momI“CJGE
`
`IIRIG-m.
`
`4<zo_5mmmoo
`
`_5.5.5:.
`
`02.
`
`XKOENZ
`
`m0<umw._.z_
`
`
`
`<h<9m2011m4whSN
`
`mzoEBm:mzoEBE
`
`0233
`
`can
`
`.63.5252_w0Emh<>En=oij
`
`mzoEmdh_nmj<o
`
`
`
`
`
`
` :55_mm>mmw_as:Saws.2»
`
`
`
`
`
`U.S. Patent
`
`11024,
`
`aEtc:O5.2
`
`2%
`
`Emmi.
`
`1teehS
`
`91
`
`0w<D
`
`MEma2.69
`
`US 8,031,849 B1
`
`m.0.“—
`
`
`
`
`
`Am>>002=$.52.]:Emhw>wOz_h<mwn_0nm<oz<hw
`
`
`
`
`
`
`
`
`
`wmo<umm._.z_Oz_s__>_<m00mn_15:.—
`
`
`
`
`
`(am—>—DK<DZ<PWDM(DZ<.FW
`
`Dm<oz<Hm
`
`
`hszw0<2<E401F200JOKPZOU
`
`om<oz<hmzozomzzoooz_._<zo_w
`ii.aszm...:._<w4.5x.mn~_o>Em3.:goes:daidouévr{<53"z305:
`
`
`....E5.5256...”
`
`Jomhzoo
`
`
`
`
`
`hzm2m0<z<EJomhzoo405.200Muwfiuwwmmm<>>om<z
`
`
`
`
`
`as:Saws.m2:zOFUmzzOoas:SOONJMPhmzmmrhm
`
`.hmae6.!
`
`3.0.0
`
`hzmsmo<z<smooz_s_<mE.m
`£03,565.qu_>_<mm._.w6260825::9.Ex._
`
`
`
`
`A92.25.99m4::9.Eu.xmozfimz
`35.059555.5xmozcmz
`
`>52“.95:«momDmemSaws.3:mmfiwflwz
`
`
`$9.8meEézfim.zmmwwwwnfinflu.<E<n<3:3:3.
`
`
`.zoEzoouum103%.5:.muzmmmuzoooonEsw55:...
`
`
`
`
`
`53%:3..motfimzmo#205.Saws.:0:Em
`02:5me3555.
`
`
`
`
`
`
`
`.806!?
`
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 11 of 19
`
`US 8,031,849 B1
`
`EINOHdBITEL
`
`(TETTIVO09?,
`
`SoITEIT,
`
`(S)×8ONALEN
`
`T\/NOILOER:IOO
`
`ALITIKOV/-|
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 12 0f 19
`
`US 8,031,849 B1
`
`58::
`
`
`
`02.5.:.35
`
`
`
`a:mozmssoo.wz<:025¢
`
`a:mN—L.Ntm<moz
`
`02«#5.
`
`mm;
`
`
`
`mm;mozzOzz<zQEo3<>_._:moEmz
`j<omoi“.IlL
`
`meflflzm._a8.35“an:
`
`
`
`woOo>zmo
`
`$3.20
`
`ohmmoOz
`
`a:«0K33
`
`hemzzoo3:.N2;
`
`
`
`"Esau“.a:IIlu8:45and
`
`S:20:33.;__IH59!L
`
`3:.mon502<x>._.m<n_%ehomhma3.55
`
`
`
`homzzoos:3.:
`
`0hmmo02oz
`
`mm>on:2.::2.aw:wm>
`
`
`
`
`
`
`
`
`
`war
`
`In02355.35a3:muz:Ozz<
`
`.mz<2025n—
`
`FF.o_n_mmngc.20
`
`
`
`xmo#8228.420main
`
`
`
`0545Ohmoz:Ozz<._._<omafia
`
`:15“.
`
`._..<Umum".dmun—.30
`
`uDun—.20OH
`
`uNGZDOZZ<
`
`._.02%Oman—<0
`
`Dm>>O._._<
`
`”has—0mm
`
`Dmgmw<m
`
`;..=mm>
`
`
`
`m._.<0:.zm_.._._.D<
`
`¢m44<0
`
`"hm—201m
`
`%ow44<o
`
`
`
`mun—.20#3....
`
`01—0:20
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 13 of 19
`
`US 8,031,849 B1
`
`Zhwl
`
`nah—6.0
`
`szImmgwh
`
`om..:<0wvn
`
`mmnoomo
`
`AVMELVE)
`
`
`
`AVMELVD
`
`Km<z=zD<
`
`U axamunnw
`
`ZOEOEPXM
`
`
`
`KENS—<15".hwy—04Efizz—5mm...
`
`molt—«Eh:—
`
`udowzoo
`
`
`
`v3.0.5.5::mOEmz
`
`zéun
`
`muzmew
`
`
`
`6E..69
`
`5:26......
`
`>zo:am._mh>p_.__o<u_
`
`4<zo_5mmmoo
`
`
`
`mmz:004<z<
`
`oh
`
`
`
`KOPOmhmDTwNn
`
`IDA«“2”
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`US 8,031,849 B1
`
`(JO SSE TERJINA
`
`
`‘N1Sd OL
`
`SSEKOSOV/
`
`
`
`XINJONALEN (JEHLO
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 15 of 19
`
`US 8,031,849 B1
`
`FIG. 14
`2’? lºº
`
`1490
`
`ORIGINATING
`TELEPHONE
`
`1485
`
`O ©
`
`
`
`POLICE
`COMMUNICATIONS
`CENTER
`
`1480
`
`Monitoring
`Station
`
`1475-N
`
`
`
`
`
`
`
`Monitoring
`Station
`
`1475–2
`
`Monitoring
`Station
`
`1475-1
`
`1430
`
`GATEWAY
`
`1435
`
`1402
`
`CALL TERMINATION 1470
`(LOCAL OR LD)
`
`AUDIO
`MINER
`
`
`
`AID
`CONVERSION
`
`1402
`
`
`
`TEMPORARY
`LOCAL
`HIGH-QUALITY
`STORAGE
`
`
`
`
`
`1ST LEVEL
`KEYWORD
`SPOTTER
`
`
`
`PACKETHZER
`
`1410
`
`
`
`COMPRESSION
`
`1415
`
`1400
`
`1440
`
`CENTRAL I REGIONAL
`SWITCH
`
`PROFILE I
`CRITERIA
`DATABASE
`º TD
`
`1465
`
`1455
`
`1450
`
`2ND LEVEL KEYWORD
`SPOTTER
`
`1460
`
`1445
`
`
`
`CENTRAL REGIONAL
`LONG-TERM STORAGE
`CONTROL
`
`CALL
`STORE
`
`
`
`U.S. Patent
`U.S. Patent
`
`LcO
`
`hS
`
`US 8,031,849 B1
`US 8,031,849 B1
`
`9_:ommmm_1_hzmmmEa.m.55maisoo_IIIIILM«:202.535
`t2922.53%"E59:
`
`lllllI.83a19.20:ES:_.IIIIII
`
`r- — —- - -
`
`|\_$609;_
`.uIIIII
`
`m;
`
`
`
`13.30440".a.._._<Uwh<z=2mm:.
`
`22_-mzo»5&2L
`02his.I_oz_zm<>:<mamm_8.:
`
`
`
`
`—lIIIIIII—
`
`llllll\1_mpéojo"._\a//1.345Imn.mEzEEE.Oz//ms_<w\4,2MH\1II22I\/
`
`Em;_aomoomm_
`.uIIIII.__53%.852;_|\muzmhmsfifi
`
`oomv
`
`20>Im_._m<._.mm
`
`
`
`41—(0z._.wn_m0
`
`2.GE
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 17 of 19
`
`US 8,031,849 B1
`
`0:29,
`
`C?TOHSERIHIL
`
`1 NEWER-IONI
`
`XIOOTTO
`
`
`
`
`
`
`
`
`
`
`
`
`
`?09),
`
`HOEWE'dS
`
`HOEWE'dS 1 TldNI
`
`
`
`
`
`?JO 10B.J. BOJ
`
`
`
`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 18 of 19
`
`US 8,031,849 B1
`
`
`
`
`
`
`0021),
`
`
`
`(S) MEAMES
`
`
`
`(S) NBANES
`
`EKONEIXIE-INOO
`
`
`
`(S) MEAMES
`
`CIELVOICIENCI
`
`09/1],
`
`09/11,
`
`
`
`NOIS MEANOO
`
`TOOO1O\ld
`
`(S)AVNAELVS)
`
`(S)AVNAELVSD
`
`d?S
`
`SINESOV
`
`
`
`U.S. Patent
`
`11no
`
`1teehS
`
`nv
`
`US 8,031,849 B1
`
`2a22452aonOz
`
`one
`
`
`
`“0....10:20.2
`
`>4<Eoz<
`
`OhE<nDn<
`
`
`
`.120mozwmmu—ZOU
`
`mg:
`
`
`
` ._<_oms_um5:5UmoBuznmmfHomzzooma
`
`zO_._.o<
`
`><>>.n
`
`w>J<EOZ<
`
`982
`
`mhwr
`
`mm»?
`
`own.
`
`mou—mwoOh
`
`m>=<zmm5<
`
`oz_._.__m
`
`EmsEmE
`
`2w
`
`oz_._.__m
`
`o_._<>
`
`
`
`how:zoom—D
`
`>hm<a
`
`..4.2020
`
`>P¢<EMNDZFFZOQ
`
`92.32%>438%
`
`2
`
`zmwmr
`
`ms:82
`
`83.
`
`av.0."—
`
`Abn—
`
`oo<>N.52
`
`onEmoo<mm>mmm
`>.E<n_mozmmmuzooz3443oh.126azmm
`
`
`
`$322
`
`3350h.55960mma
`moznozz<o.EEK3.53
`
`
`Ammatmsu.hzmsmozaozz<
`
`m>_uomm
`
`mm?33
`
`on:mg:
`
`KENS
`
`$3.20
`
`emar
`
`32.83
`
`53o.H.302.
`
`83.20352.
`
`
`
`.Ammztkfihmflfiwm
`
`
`
`
`
`
`
`
`
`
`
`US 8,031,849 B1
`
`1
`TELEPHONY SYSTEM AND METHOD WITH
`ENHANCED FRAUD CONTROL
`
`RELATED APPLICATIONS
`
`The present application claims priority based on these
`related Provisional Applications:
`1. IP-Based Telephony System and Method, Ser. No. 60/607,
`447, filed Sep. 3, 2004;
`2. Telephony System and Method with Improved Validation,
`Ser. No. 60/676,155, filed Apr. 29, 2005;
`3. Telephony System and Method with Improved Call Moni
`toring, Ser. No. 60/676,153, filed Apr. 29, 2005;
`4. Telephony System and Method with Improved Caller
`Access Control, Ser. No. 60/676,151, filed Apr. 29, 2005;
`5. Telephony System and Method, Ser. No. 60/676,154, filed
`Apr. 29, 2005;
`6. Telephony System and Method with Improved Fraud Con
`trol, Ser. No. 60/676,152, filed Apr. 29, 2005;
`Each of these provisional applications is hereby incorpo
`rated by reference for all purposes in the present application
`as if set forth in its entirety herein.
`In addition, other related non-provisional applications filed
`concurrently with the present application are:
`8. Telephony System and Method with Enhanced Call Moni
`toring, Recording and Retrieval, by W. L. Apple and T. E.
`Pabon:
`9. IP-Network-Based Telephony System and Method, by W. L.
`Apple, and T. E. Pabon;
`10. Telephony System and Method with Enhanced Validation,
`by W. L. Apple, T. E. Pabon and J. V. Townsend;
`11. Telephony System and Method with Enhanced Caller
`Access Control, by W. L. Apple and T. E. Pabon;
`12. Telephony System and Method with Improved Fraud Con
`trol, by W. L. Apple, K. J. Gumbiner, T. E. Pabon, and W.
`Ryan.
`Each of these concurrently filed non-provisional related
`applications is hereby incorporated by reference for all pur
`poses in the present application as if set forth in its entirety
`herein. In the sequel, the above-identified related incorpo
`rated applications will be referred to by the paragraph number
`in which it appears, e.g. incorporated application 1, or incor
`porated provisional application 1, is a reference to IP-Based
`Telephony System and Method cited in paragraph 1 above.
`Because each of the cited concurrently filed applications
`incorporates all of the others, but none incorporates itself by
`reference, the corresponding paragraph number for the
`present application is intentionally omitted.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of tele
`communications. More particularly, the present invention
`relates, in one aspect, to voice and data telecommunications
`systems and methods. Still more particularly, aspects of the
`present invention relate to voice and data telecommunications
`systems and methods for use in providing collect, pre-paid
`calling or other billing options. Yet more particularly,
`embodiments of the present invention relates to such telecom
`munications systems and methods as applied to inmate tele
`phone calling systems and methods for providing telephone
`calling services to inmates in correctional and other confine
`ment facilities. The terms confinement facilities and correc
`tional facilities are used interchangeably in this application.
`
`BACKGROUND OF THE INVENTION
`
`Various telephone calling and billing arrangements have
`been developed over the long history of the telecommunica
`
`50
`
`55
`
`60
`
`65
`
`2
`tions industry. From operator-controlled local and long dis
`tance calls to automatic direct dialing to newly emerging
`computer telephony calling over data networks, and from
`plain-old-telephone service (POTS) to collect calling, to call
`ing card, toll-free calling and pre-paid calling—among many
`others—the telephone industry has been continually seeking
`to apply new technologies to provide new and more flexible
`telephone calling services.
`Electronic and optical switching, transmission, signaling,
`and database storage of many kinds have expanded the reach
`of telephony techniques to many new and enhanced applica
`tions. These and a variety of processors and other facilities
`embedded in, or linked to, more traditional facilities in the
`Public Switched Telephone Network (PSTN) have still fur
`ther enlarged the spectrum of telephone services available to
`the public.
`One telephone service area that has developed rapidly in
`recent years is that of providing telephone communications to
`inmates in jails, prisons and other confinement facilities,
`sometimes referred to as Inmate Calling Services (ICS).
`While ICS contexts involve functions in common with every
`day home and business calling, and with calling from public
`facilities such as airports and hotels, special issues arise that
`are peculiar to ICS. Thus, for example, controls over timing,
`duration, allowed called destinations, and billing—among
`many others—must be addressed in planning and implement
`ing ICS.
`An important goal in providing ICS is call efficiency—
`despite the need to observe the many constraints characteris
`tic of ICS calling. Thus, for example, automation of call
`setup, monitoring and billing processes for ICS is of high
`importance. In particular, since collect and other special bill
`ing arrangements are common in the provision of ICS, avoid
`ance of costs associated with human operators to provide
`step-by-step controls for ICS has long been recognized. U.S.
`Pat. No. 4,054,756, issued Oct. 18, 1977 to Comella and
`Yokelson discloses a system and method for automating
`many operator services, including playing of recorded
`announcements, collection of information from calling and
`called parties, call setup and billing based on such inputs. Use
`of functionality like that described in the last-cited patent has
`therefore found application in the provision of ICS.
`As computing power has greatly increased and been made
`available in the form of now-ubiquitous personal computers,
`the Comella, et al. teachings have been adapted to provide
`much of the computing power used to provide ICS. In par
`ticular, providing ICS to inmates in confinement facilities has
`lately been accomplished through the use of analog telephone
`station equipment (usually hardened versions of basic home
`or office telephone sets) connected to one or more personal
`computers located on-premises at correctional facility loca
`tions. Such computers are used, among other things, to con
`trol telephone access to the PSTN, record conversations as
`appropriate, and to generate and record Station Message
`Detail Reporting (SMDR) data for use in billing calls made
`from the correctional facility.
`FIG. 1 shows a functional network diagram representation
`of a typical prior art ICS systems, including apparatus
`installed at a correctional facility connected to the PSTN. In
`particular, a telephone facility 100 is shown as including a
`plurality of analog telephone sets 101-i, i=1, 2, . . . , N.
`illustratively connected to control computer 110. Telephone
`sets 101-i and computer 110 may be physically located in
`different areas or different buildings of a correctional facility;
`more than one control computer 110 may be employed if
`required to meet calling volume at the facility. Control com
`puter(s) 110 located on-site within an illustrative correctional
`
`
`
`3
`facility are typically connected directly to the PSTN via on
`site analog loop-start telephone lines or, in some cases, mul
`tiplexed digital connections, e.g., T1 carrier links. Personal
`computer-based control computer 110 typically includes a
`plurality of peripheral interface cards to accomplish connec
`tivity between the analog stations and the PSTN. Illustra
`tively, Intel Dialogic D/4PCI cards are used to interface to up
`to four input telephone sets per card. In some applications, up
`to 16 such cards can be used in a single computer to provide
`access to PSTN 120 for up to 64 telephone sets. Other par
`ticular Intel cards can provide much higher line coverage.
`While the illustrative Intel cards provides functionality for
`detecting ringing associated with incoming calls, ICS calling
`is typically limited to providing only outbound calling from
`the correctional institution.
`The one or more control computers 110 at each correc
`tional facility site, in cooperation with PSTN functionality
`provided off-site by local and long distance telephone com
`panies, control the sequence of events required to complete
`ICS calls originated at the correctional facility site to called
`parties connected to the PSTN. Such calls are typically either
`collect or debit/prepaid telephone calls to remote called par
`ties identified by inmates using the facilities shown in FIG. 1.
`In FIG.1 the PSTN is represented as cloud 120; parts of PSTN
`120 are shown outside this cloud to emphasize the part they
`25
`play in completing the call. In particular, illustrative PSTN
`switches 140 and 145 are shown serving representative sta
`tions, shown as telephones 170 and 160, respectively, in FIG.
`1. Telephone station set 160, by way of example, is indicated
`as the called party’s telephone set.
`The owner or provider of the on-site telephony equipment
`and ICS incurs purchase, operation and maintenance costs
`associated with the completion of such calls, and seeks a
`profit by charging a rate for ICS calls that repays both the
`fixed costs (equipment, maintenance and other) and the vari
`35
`able per-call costs that the provider incurs for use of PSTN
`120.
`As will be appreciated from the foregoing, control com
`puter costs, telephone line use costs, and maintenance costs
`associated with ensuring a high level of system up-time at
`many geographically distributed (on-correctional-site) instal
`lations—each including complex computer hardware and
`associated software—can be burdensome and expensive.
`Voice over IP (VOIP) techniques using the Internet or other
`data networks offer possible alternatives to a range of existing
`business and residential communications systems. In particu
`lar, VOIP systems are emerging as candidate implementa
`tions for a variety of enterprise communications solutions.
`One illustrative example of such systems is available from
`Quintum Technologies. Residential use, as illustrated by
`AT&T’s Call Vantage VOIP service over high-speed cable
`connections, and digital subscriber line Internet connections
`by local exchange carriers and others, is also emerging as a
`possible alternative to local and long distance calling using
`traditional Plain Old Telephone Service (POTS). A formal
`XML Schema for IP-based voice telephony service is
`included as Exhibitipdr-1 in incorporated provisional appli
`cation 1.
`A particular aspect of collect, bill-to-third-party, and calls
`involving other particular billing options is that of billing
`validation. Billing validation relates generally to validating
`the availability of identified accounts for billing of a call, and
`has proven to be especially important for inmate calling.
`Thus, for example, validation is commonly sought for collect
`calls to determine that the account, including called party
`account numbers, exist and are of a class for which billing can
`be accomplished by one or more billing entities. In some
`
`55
`
`40
`
`45
`
`50
`
`60
`
`65
`
`US 8,031,849 B1
`
`10
`
`15
`
`20
`
`30
`
`4
`cases, as, for example, for at least some calls to a called party
`at a cellular account number, it is often difficult to ensure
`billing for the benefit of an ICS provider placing the call on
`behalf of a calling party. Often bills for calls completed to a
`variety of called party destination types prove to be uncol
`lectible unless complex, expensive and time-consuming vali
`dation techniques are used. Further, these techniques are
`applied in prior practice even when a call is not completed, as
`when the called number is busy or a called party fails to
`anSWer.
`Because of the rise in popularity of cellular and other
`portable telephone devices, many of which do not provide
`billing collection services for calls placed by wireline ICS
`providers, an important step in insuring payment for ICS is to
`verify the type of service subscribed to by the called party for
`ICS calls. Perhaps even more important in this regard is the
`rise of CLECs or Competitive Local Exchange Carriers, who
`often lack the ability or inclination to provide billing collec
`tion for calls processed by an ICS provider. CLECs are to be
`contrasted with the traditional incumbent local exchange car
`riers (ILECs), such as a Regional Bell Operating Company
`(RBOC).
`Some estimates report that upwards of 20 percent of calls
`sought to be completed by ICS providers are ultimately to be
`completed by CLECs. When combined with mobile services
`such as cellular telephone services for which billing is some
`times problematic, the combined percentage of calls poten
`tially associated with billing problems can easily approach or
`exceed twenty-five percent.
`To help reduce the number of calls completed to telephone
`stations associated with cellular service, CLEC and other
`services that do not ensure collection and payment of charges
`for ICSs, and for other service providers concerned about
`billing of charges for services rendered, a number of data
`bases are maintained by the telephone industry for checking
`the status of particular telephone lines. In particular, so-called
`Line Identification Databases (LIDB databases) provide a
`variety of information for telephone lines. Thus, a database
`query launched to a LIDB or similar database for a call can
`provide some information relating to whether calls to a par
`ticular line (and the account and phone number associated
`with it) can be counted on (or not) to be billed by the number
`provider.
`Other databases having special information about particu
`lar telephone subscriber accounts may also be maintained,
`including, generally, a class known as billed number screen
`ing databases or by other particular names. Some of these are
`maintained locally by service providers based on past history
`of payment, credit or other factors. All of these may help
`service providers, including ICS providers, to increase the
`share of calls that can actually be billed, thereby increasing
`the share of calls for which charges are actually collected.
`As might be expected, use of LIDB and other telephone
`line or account databases by service providers seeking infor
`mation about particular telephone lines or accounts incurs
`charges by the providers of such databases. Since data com
`monly found in such databases is available more easily to
`some industry participants than others, concern is sometimes
`expressed by those querying the database as to these charges
`and conditions associated with use of the databases. In par
`ticular, a significant percentage of calls for which line or
`account databases (hereinafter, LIDB databases) are queried
`(i.e., for which so-called database dips are performed) prove
`to be no-revenue calls. This no-revenue condition can arise
`because the LIDB data raises issues about the likelihood of
`being able to bill for the call. For example, the unlikely ability
`to bill for the call may be indicated by a database response
`
`
`
`US 8,031,849 B1
`
`5
`indicating no data is available for the particular line/account
`(hereinafter, line). In some cases, it is possible to arrange for
`alternative payment methods by which a called party can pay
`for received calls, even if such payment options are not
`reflected in the LIDB database response. But by the time such
`arrangements have been made, a LIDB dip may well have
`been performed, and a cost to the ICS provider incurred.
`Further, even if the line information received in response to
`a LIDB dip appears to warrant the completion of a call in the
`expectation of being able to bill for the call, the call may not
`be completed, e.g., because of a busy line or a no-answer
`condition at the time of the call. As to conditions associated
`with LIDB services, it is often required that even successive
`calls to the same number must employ a separate LIDB dip,
`thus incurring multiple charges for the same information over
`a short interval. Moreover, storage (or caching) of prior LIDB
`dip results is typically discouraged under contracts with
`LIDB database providers. Thus, ICS and other service pro
`viders incursubstantial costs for LIDB services, even for calls
`or call attempts for which no revenue will be derived by the
`ICS provider.
`In yet another way that ICS providers incur costs without
`deriving any revenues involves so-called billed number
`screening (BNS). Callers attempting to place a third number
`billed or collect call to a line equipped with BNS will be
`advised by an announcement that such billing is not autho
`rized and another form of billing is required. Such need for
`alternative billing arrangements may not be determined
`before costs of call setup and LIDB dip has been performed,
`thus incurring cost to an ICS provider. It is obviously prefer
`able that such alternative billing arrangements not be negoti
`ated on each call to a BNS line.
`It is therefore desirable for network users, such as ICS
`providers, to ascertain with increased certainty that calls
`placed can be billed. Moreover, it is desirable that such calls
`incurrminimum costs to the provider and provide convenience
`for calling and called parties to an ICS call.
`A need therefore exists to provide flexible and economical
`validation of billing status for called parties or others relied
`upon by an inmate to pay charges for ICS calls.
`A continuing problem in ICS is that though an original
`called party (e.g., an inmate’s lawyer or an approved family
`member) can be qualified by correctional authorities to
`receive inmate calls, such calls can sometimes be forwarded,
`extended, bridged, or otherwise connected to other parties
`who have not been so qualified. A primary mechanism for
`permitting calls to such not-qualified persons