throbber
(12) United States Patent
`Apple et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 8,031,849 B1
`Oct. 4, 2011
`
`US008031849B1
`
`(54) TELEPHONY SYSTEMAND METHOD WITH
`ENHANCED FRAUD CONTROL
`
`(75) Inventors: Wesley Larry Apple. Archdale, NC
`(US); Timothy Edwin Pabon,
`Greensboro, NC (US)
`
`1/1989 Daudelin
`4,797,910 A
`4,890,317 A 12/1989 Hird et al.
`4,908,852 A
`3/1990 Hird et al.
`4,922,519 A
`5/1990 Daudelin
`4,933,965 A
`6/1990 Hird et al.
`4,933,966 A
`6/1990 Hird et al.
`4,935,956 A
`6/1990 Hellwarth et al.
`4,993,062 A
`2/1991 Dula
`-
`-
`5,048,079 A
`9/1991 Harrington et al.
`
`(73) Assignee: * 5,093,858. A 3/1992 Hird et al.
`s
`s
`5,113,433 A
`5/1992 Hird et al.
`- -
`5,131,027 A
`7/1992 Hird et al.
`-
`-
`-
`Subject to any disclaimer, the term of this
`5,159,698 A 10/1992 Harrington et al.
`patent is extended or adjusted under 35
`Continued
`U.S.C. 154(b) by 1736 days.
`(Continued)
`FOREIGN PATENT DOCUMENTS
`1 388 997 A1
`2/2004
`(Continued)
`OTHER PUBLICATIONS
`Arons, Barry,"SpeechSkimmer: A System for Interactively Skim
`ming Recorded Speech,” ACM Transactions on Computer-Human
`Interaction, vol. 4, No. 1, Mar. 1997, pp. 3-38.
`-
`(Continued)
`-
`-
`-
`-
`-
`-
`Primary Examiner – Binh Tieu
`(74) Attorney, Agent, or Firm – Kilpatrick Townsend &
`Stockton, LLP
`
`-
`(*) Notice:
`
`(21) Appl. No.: 11/219,570
`(22) Filed:
`Sep. 2, 2005
`Related U.S. Application Data
`(60) Provisional application No. 60/607,447, filed on Sep.
`3, 2004, provisional application No. 60/676.155. filed
`on Apr. 29, 2005, provisional application No.
`60/676,153, filed on Apr. 29, 2005, provisional
`application No. 60/676,151, filed on Apr. 29, 2005,
`provisional application No. 60/676,154, filed on Apr.
`29, 2005, provisional application No. 60/676,152,
`filed on Apr. 29, 2005.
`
`(51) Int. Cl.
`(2006.01)
`H04M 15/06)
`(2006.01)
`H04M H 7/00
`(52) U.S. Cl. .............. 379/145; 379/114.14; 379/11403;
`704/273; 704/274
`(58) Field of Classification Search ............. 379/114.14,
`379/143, 144,03, 188, 145; 704/208, 210,
`704/216, 217, 218, 231, 236, 237,251, 273,
`704/274
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`|U.S. PATENT DOCUMENTS
`4,054,756 A 10/1977 Comella et al.
`4,339,385 A * 7/1982 Burri ............................. 548/409
`
`EP
`
`ABSTRACT
`(57)
`Inmate communications systems provide a feature-rich plat
`form with a high degree offlexibility and security employing
`call control facilities located off institutional premises.
`Authentication processes for calling and called party verifi
`cation include biometric techniques in some embodiments.
`Distributed processing of call control and billing provide
`flexible interactive call payment processes. Preferred
`embodiments feature voice over IP transmission and control
`featuring controlled access to avoid addition of unauthorized
`third-party call participants. Monitoring, recording and selec
`tive forwarding of calls is provided under control of system
`administrators.
`
`20 Claims, 19 Drawing Sheets
`
`YES
`
`PROMPT:
`USER ID:
`
`PRößlpt:
`PASSWORD
`
`WERIFY;
`AuTHENTICATE
`£ALLER
`
`r- -F º ºr -
`1988]... 1.- Tian
`lwallpation
`
`| Waibaron
`
`PLACE CALL,
`&NNoUNCE
`CALLER &
`FREE CALL
`fºLAN on ANS,
`
`
`
`ANNoUNCE:
`CALLEty; Nor
`ALLøWEd
`
`PuT CALLER
`of HøLd
`
`YES
`
`#PLACE CALL
`to cal-LED #
`
`ANNou NCE
`CALL &
`cALLING PTY
`on ANSWER
`
`
`
`c3R to
`CALLET)
`PARTY
`
`1173
`
`1474
`PLACE CALL,
`ANNou NCE
`£ALLER &
`FREE CALE.
`PLAN ºf ÅM3.
`
`proßpt:
`AccEPtoR
`teNY code
`
`PARTY
`
`1:23
`
`coºleNºte
`CALL TIMING
`
`1328
`
`DETECT
`HANGiºf ort
`TIMEºut
`
`1728
`
`1160
`connect cºsR
`to C?lied
`PARTY
`
`1854
`
`GTL 1021
`IPR of U.S. Patent No. 8,340,260
`
`

`

`5
`
`5
`
`|U.S. PATENT DOCUMENTS
`-
`sº. A gº ºn. 379/88.02
`52- :
`* *
`:-> “… .
`5.319,701 A
`6/1994 Hird et al.
`5.319,702 A
`6/1994 Kitchin et al.
`5,351,290 A
`9/1994 Naeini et al.
`5,414.755 A +
`5/1995 Bahler et al. -- . . . . . . . . . . . . 379/88.02
`5,483,581. A
`1/1996 Hird et al.
`5.535.261 A
`7/1996 Brown et al.
`5,539,812 A
`7/1996 Kitchin et al.
`5,602,900 A * 2/1997 Hattori .......................... 455/566
`5,623,539 A * 4/1997 Bassenyemukasa
`et al. … 379/88.02
`81997 Gainsboro
`5,655,013 A
`5,729,741. A
`3/1998 Liaguno et al.
`5,768,355. A
`6/1998 Salibrici et al.
`5,781,611 A * 7/1998 Park ........................... 379/32.04
`5,796,811 A
`8/1998 McFarlen
`::::::: * }; §. al
`5,867,494 A
`2/1999 Krishnaswamy et al.
`5,926,533 A
`7/1999 Gainsboro
`5.960,072 A
`9/1999 Hird et al.
`6,064,963 A
`5/2000 Gainsboro
`6,141,406 A,
`10/2000 Johnson
`6,185,527 B1
`2/2001 Petkovic et al.
`6,336,090 B1
`1/2002 Chou et al.
`6,434,520 B1
`8/2002 Kanevsky et al.
`6,480,825 B1
`11/2002 Sharma et al.
`6,542,869 B1
`4/2003 Foote
`6,560,323 B2
`5/2003 Gainsboro
`6,611,583 B1
`8/2003 Gainsboro
`6,636,504 B1 10/2003 Albers et al.
`6,639,977 B1 102003 Swope et al.
`6,639,978 B2 10/2003 Draizin et al.
`6,647,096 B1 11/2003 Milliorn et al.
`6,665,376 B1 12/2003 Brown et al.
`6,665,380 B1
`12/2003 Cree et al.
`6,668,045 B1 12/2003 Mow
`6,760,701 B2
`7/2004 Sharma et al.
`6,763,099 B1
`7/2004 Blink
`6,795,540 B1
`9/2004 Mow
`6,804,331 B1
`10/2004 Vacek et al.
`6,836,540 B2 12/2004 Falcone et al.
`6.842,447 B1
`1/2005 Cannon
`6'895,086 B2
`5/2005 Martin
`6,898,277 B1
`5/2005 Meteer et al.
`6,920,209 B1
`7/2005 Gainsboro
`7,013,002 B2
`3/2006 Link et al.
`7,042,992 B1
`5/2006 Falcone et al.
`7,136,817 B2 * 1 1/2006 Schroder et al. .............. 704/275
`7,158,621 B2
`1/2007 Bayne
`7,403,766 B2 * 7/2008 Hodge .......................... 455/411
`7,494,061 B2
`2/2009 Reinhold
`
`.
`
`US 8,031,849 B1
`Page 2
`
`3/2009 Spadaro et al.
`7,505,406 B1
`5/2009 Rae et al.
`7,529,357 B1
`7,778,832 B2 * 8/2010 Broman et al. ............... 704/246
`2001/0036297 A1 11/2001 Ikegami et al.
`2001/0036821 A1 1 1/2001 Gainsboro et al.
`2001/0043697 A1 1 1/2001 Cox et al.
`2002/0120756 A1
`8/2002 Lynam et al.
`2002/0126626 A1
`9/2002 Singh et al.
`2002/0168060 A1 1 1/2002 Huie
`2003/0009333 A1
`1/2003 Sharma et al.
`2003/0034423 A1
`2/2003 Hess et al.
`2003/0035523 A1
`2/2003 Mansfield
`2003/009 1046 A1
`5/2003 Fang et al.
`2003/0126470 A1
`7/2003 Crites et al.
`2003/0138084 A1
`7/2003 Lynam et al.
`2003/0200182 A1 10/2003 Truitt et al.
`2004/0022380 A1
`2/2004 Lynam et al.
`2004/0029564 A1
`2/2004 Hodge
`2004/0190702 A1
`9/2004 Mayer et al.
`2005/0018828 A1
`1/2005 Nierhaus et al.
`:::::::::::: A. § º * 455/411
`2005/0.141678 A1
`6/2005 Anders
`2005/0190.902 A1
`9/2005 Benco et al.
`2005/0283475 A1 12/2005 Beranek et al.
`2006/0188077 A1* 8/2006 Susen et al. .............. 379/114,01
`2006/02856.50 A1 12/2006 Hodge
`2009/0046841 A1* 2/2009 Hodge .......................... 379/189
`FOREIGN PATENT DOCUMENTS
`WO 00/76.158 A1 12/2000
`
`:};
`
`WO
`
`OTHER PUBLICATIONS
`Alon, Guy, “Key-Word Spotting—The Base Technology for Speech
`Analytics.” http://
`lectronics-2000.com/i
`/aardvark/k
`ytics,
`tp: www.electronicS-
`.CO Images aardvar WS.
`pdf, Jul. 2005, pp. 1-8.
`Dharanipragada, S., “A Fast Vocabulary Independent Algorithm for
`Spotting Words in Speech.”Acoustics,Speech,and Signal Process
`ing,’98 IEEE IN.Conf, V. 1, May’98,pp. 233-236.
`Johnson, Charles E., “New Technology Is Creating Improvements in
`the Corrections Field,” Corrections Today, Jul. 2005, pp. 62-64.
`Leavitt, Neal, “Let’s Hear It for Audio Mining.” IEEE Comp., Oct.
`2002, pp. 23-25
`4. Pp. 32.4°.
`-
`-
`. . . .22
`-
`Pfeiffer, Silvia, Automatic Audio Content Analysis, Proceedings of
`the fourth ACM International Conference on Multimedia, Feb. 1997,
`pp. 21-30.
`- X-
`- -
`-
`Wold, Erling, “Content-Based Classification, Search, and Retrieval
`of Audio.” Multimedia, IEEE vol. 3, Issue 3, Fall 1996, pp. 27-36.
`Sulkin, Allan, PBX Systems for IP Telephone, McGraw-Hill, 2002,
`pp. 183-202.
`* cited by examiner
`
`

`

`U.S. Patent
`
`US 8,031,849 B1
`
`
`
`
`
`
`
`001,
`
`
`
`EINOH«HETE).E NOHdBITEL
`
`soNITIVO
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 2 of 19
`
`US 8,031,849 B1
`
`mzoznmdh/2...SN
`
`<._.<D-m_zOIn_wn_m._.
`
`
`
`szIame...szInfiJmh
`
`0234<U
`
`oou
`
`
`
`mw<m<k<n......
`
`QWJ4<U
`
`mZOIQNJMH
`
`mesz
`
`wo<u_~._w._.z_
`
`<53
`
`xmozfimz
`
`:03
`
`5.255.
`
`
`
`OZEWMOOKQn=O>
`
`._<ZO_._.Om¢xOO
`
`>._._.=U<u_
`
`..mimozcmzN0Emp<>_m&o:m:n_
`
`hmxoci
`
`3330sz
`
`
`
`

`

`U.S. Patent
`
`tcO
`
`91
`
`US 8,031,849 B1
`
`M35352.
`
`mmNN
`
`:8w5205on<%9wvI.I.33Mwv1AmummmzAm.352,n._o>4.«S
`3xmozfimz.2255»
`
`
`
`AVMELVS
`
`>zOIn_m._m._.
`
`1023.0:
`
`mNN
`
`
`
`aha:..0.m
`
`.
`
`AVMElVE)
`
`hm¥0<m
`
`meEmz
`
`w0<uEth_
`
`z_s_D<
`
`._<z_s_mm._.
`
`run
`
`mm.0...—
`
`w
`r
`n
`
`<n.0."—
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`2
`
`f
`
`US 8,031,849 B1
`
`can
`
`
`cmohompmo5.02520mozm.__m555.
`mmofimmpz.
`
`xnwun
`
`wron
`
`
`
`>zo:.m:m»1nnnnnnnn.m._.<0:Otgm02.1.1.5mn=o>
`
`
`
`
`
`w3"
`
`
`o.55280253005
`
` €2.5545.025220:81:008:Ew9:23mumw.aaMas”wv
`
`A«mama:at.6.5zo:<o_u__¢m>
`
`.A
`
`mom
`
`._.zmEOZDOZ<
`
`mmOhw
`
`amomoomm
`
`Hzm2m02302<
`
`domhzoo
`
`0n.0."—
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet50f19
`
`US 8,031,849 B1
`
`v
`NV
`
`«NV
`
`Oz
`
`a;u_._<0mojn
`
`aom....<oO...
`
`a:
`
`moz:Ozz<
`
`1:46
`
`E«.233
`
`owe
`
`"kn—.2011
`
`KOhum00<
`
`WOOD>zwo
`
`
`
` ._._<08:muzmssoo
`
`02345
`
`mm>
`
`
`
`wNvhemhwo
`
`g.an502<z
`
`v;
`
`nmuzzOzz<
`
`._.Oz%Dual—<0
`
`DEED-34‘
`
`2?"has—ONE
`
`D.«Em:
`
`mw>
`
`8v”has—01A
`
`anSmmSu
`
`as>n=mw>
`
`¢m44<0
`
`"has—Omn—
`
`#Dw44<0
`
`v.0."—
`
`Zulj<0ban.
`
`01.0:20
`
`¢o
`
`o
`
`._.N_<._.m
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Lc
`
`1
`
`US 8,031,849 B1
`
`
`
`OmzoEmdp3..
`
`t3553Moe.....ve.Ah-s_
`6axoz_._.__m
`
`a_._<zoFoum¢oo4325m25“.
`cu._.1m:uan.
`.n_IIIIIIIIImoF.5>565.
`
`«3
`
`8“3220.59
`
`:53
`
`A<Z=2¢WP
`
`
`
`MZOInmnfi...szIEWAm...
`
`Uz_Jn_<0
`
`can
`
`m_m—:otzmE?Wlm3
`
`
`
` 3:_na:._92:oz_mmmoomaHon._920.55.60
`
`0w.._.mnsmzoz<oEEm>
`
`mzoxamdp_8.35
`
`m.mV—u—35.82sz_$3553.52
`3425:0ij5:93
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet70f19
`
`US 8,031,849 B1
`
`.....
`
`mm<m<h<o
`
`8.
`
`wZOImmdm...
`
`
`
` o:E:U._._>>mZEmn.
`
`mt.“
`
`c3.
`
`z=>_o<
`
`._<z_mmh
`
`58
`
`
`
`szImmgmhszIQNJNP
`
`023.20
`
`
`
`mar.car
`
`
`
`m2.J<zo_h0mm¢00
`
`t3_0<u
`
`Dm44<0
`
`szIn—mn—m...
`
`our
`
`mm
`
`
`m—IO._._>>wZhwm
`wlm|9;
`
`
`
`mmxm.mgxmozcmz
`
`wh<>En=03mDm
`
`
`
`02-mmmuommmo...mom
`
`«.055
`
`‘zOFONIEOO
`
`02:45
`
`zo_h<o_u_mm>
`
`5.on
`
`Amimozcmz
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 8 of 19
`
`US 8,031,849 B1
`
`W-001Z-001|--002
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 9 of 19
`
`USSJB1349B1
`
`
`mm<m<h<o....._:mozfimz
`4E3-67.5252_5:05_momI“CJGE
`
`IIRIG-m.
`
`4<zo_5mmmoo
`
`_5.5.5:.
`
`02.
`
`XKOENZ
`
`m0<umw._.z_
`
`
`
`<h<9m2011m4whSN
`
`mzoEBm:mzoEBE
`
`0233
`
`can
`
`.63.5252_w0Emh<>En=oij
`
`mzoEmdh_nmj<o
`
`
`
`
`
`
` :55_mm>mmw_as:Saws.2»
`
`
`
`

`

`U.S. Patent
`
`11024,
`
`aEtc:O5.2
`
`2%
`
`Emmi.
`
`1teehS
`
`91
`
`0w<D
`
`MEma2.69
`
`US 8,031,849 B1
`
`m.0.“—
`
`
`
`
`
`Am>>002=$.52.]:Emhw>wOz_h<mwn_0nm<oz<hw
`
`
`
`
`
`
`
`
`
`wmo<umm._.z_Oz_s__>_<m00mn_15:.—
`
`
`
`
`
`(am—>—DK<DZ<PWDM(DZ<.FW
`
`Dm<oz<Hm
`
`
`hszw0<2<E401F200JOKPZOU
`
`om<oz<hmzozomzzoooz_._<zo_w
`ii.aszm...:._<w4.5x.mn~_o>Em3.:goes:daidouévr{<53"z305:
`
`
`....E5.5256...”
`
`Jomhzoo
`
`
`
`
`
`hzm2m0<z<EJomhzoo405.200Muwfiuwwmmm<>>om<z
`
`
`
`
`
`as:Saws.m2:zOFUmzzOoas:SOONJMPhmzmmrhm
`
`.hmae6.!
`
`3.0.0
`
`hzmsmo<z<smooz_s_<mE.m
`£03,565.qu_>_<mm._.w6260825::9.Ex._
`
`
`
`
`A92.25.99m4::9.Eu.xmozfimz
`35.059555.5xmozcmz
`
`>52“.95:«momDmemSaws.3:mmfiwflwz
`
`
`$9.8meEézfim.zmmwwwwnfinflu.<E<n<3:3:3.
`
`
`.zoEzoouum103%.5:.muzmmmuzoooonEsw55:...
`
`
`
`
`
`53%:3..motfimzmo#205.Saws.:0:Em
`02:5me3555.
`
`
`
`
`
`
`
`.806!?
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 11 of 19
`
`US 8,031,849 B1
`
`EINOHdBITEL
`
`(TETTIVO09?,
`
`SoITEIT,
`
`(S)×8ONALEN
`
`T\/NOILOER:IOO
`
`ALITIKOV/-|
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 12 0f 19
`
`US 8,031,849 B1
`
`58::
`
`
`
`02.5.:.35
`
`
`
`a:mozmssoo.wz<:025¢
`
`a:mN—L.Ntm<moz
`
`02«#5.
`
`mm;
`
`
`
`mm;mozzOzz<zQEo3<>_._:moEmz
`j<omoi“.IlL
`
`meflflzm._a8.35“an:
`
`
`
`woOo>zmo
`
`$3.20
`
`ohmmoOz
`
`a:«0K33
`
`hemzzoo3:.N2;
`
`
`
`"Esau“.a:IIlu8:45and
`
`S:20:33.;__IH59!L
`
`3:.mon502<x>._.m<n_%ehomhma3.55
`
`
`
`homzzoos:3.:
`
`0hmmo02oz
`
`mm>on:2.::2.aw:wm>
`
`
`
`
`
`
`
`
`
`war
`
`In02355.35a3:muz:Ozz<
`
`.mz<2025n—
`
`FF.o_n_mmngc.20
`
`
`
`xmo#8228.420main
`
`
`
`0545Ohmoz:Ozz<._._<omafia
`
`:15“.
`
`._..<Umum".dmun—.30
`
`uDun—.20OH
`
`uNGZDOZZ<
`
`._.02%Oman—<0
`
`Dm>>O._._<
`
`”has—0mm
`
`Dmgmw<m
`
`;..=mm>
`
`
`
`m._.<0:.zm_.._._.D<
`
`¢m44<0
`
`"hm—201m
`
`%ow44<o
`
`
`
`mun—.20#3....
`
`01—0:20
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 13 of 19
`
`US 8,031,849 B1
`
`Zhwl
`
`nah—6.0
`
`szImmgwh
`
`om..:<0wvn
`
`mmnoomo
`
`AVMELVE)
`
`
`
`AVMELVD
`
`Km<z=zD<
`
`U axamunnw
`
`ZOEOEPXM
`
`
`
`KENS—<15".hwy—04Efizz—5mm...
`
`molt—«Eh:—
`
`udowzoo
`
`
`
`v3.0.5.5::mOEmz
`
`zéun
`
`muzmew
`
`
`
`6E..69
`
`5:26......
`
`>zo:am._mh>p_.__o<u_
`
`4<zo_5mmmoo
`
`
`
`mmz:004<z<
`
`oh
`
`
`
`KOPOmhmDTwNn
`
`IDA«“2”
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`US 8,031,849 B1
`
`(JO SSE TERJINA
`
`
`‘N1Sd OL
`
`SSEKOSOV/
`
`
`
`XINJONALEN (JEHLO
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 15 of 19
`
`US 8,031,849 B1
`
`FIG. 14
`2’? lºº
`
`1490
`
`ORIGINATING
`TELEPHONE
`
`1485
`
`O ©
`
`
`
`POLICE
`COMMUNICATIONS
`CENTER
`
`1480
`
`Monitoring
`Station
`
`1475-N
`
`
`
`
`
`
`
`Monitoring
`Station
`
`1475–2
`
`Monitoring
`Station
`
`1475-1
`
`1430
`
`GATEWAY
`
`1435
`
`1402
`
`CALL TERMINATION 1470
`(LOCAL OR LD)
`
`AUDIO
`MINER
`
`
`
`AID
`CONVERSION
`
`1402
`
`
`
`TEMPORARY
`LOCAL
`HIGH-QUALITY
`STORAGE
`
`
`
`
`
`1ST LEVEL
`KEYWORD
`SPOTTER
`
`
`
`PACKETHZER
`
`1410
`
`
`
`COMPRESSION
`
`1415
`
`1400
`
`1440
`
`CENTRAL I REGIONAL
`SWITCH
`
`PROFILE I
`CRITERIA
`DATABASE
`º TD
`
`1465
`
`1455
`
`1450
`
`2ND LEVEL KEYWORD
`SPOTTER
`
`1460
`
`1445
`
`
`
`CENTRAL REGIONAL
`LONG-TERM STORAGE
`CONTROL
`
`CALL
`STORE
`
`

`

`U.S. Patent
`U.S. Patent
`
`LcO
`
`hS
`
`US 8,031,849 B1
`US 8,031,849 B1
`
`9_:ommmm_1_hzmmmEa.m.55maisoo_IIIIILM«:202.535
`t2922.53%"E59:
`
`lllllI.83a19.20:ES:_.IIIIII
`
`r- — —- - -
`
`|\_$609;_
`.uIIIII
`
`m;
`
`
`
`13.30440".a.._._<Uwh<z=2mm:.
`
`22_-mzo»5&2L
`02his.I_oz_zm<>:<mamm_8.:
`
`
`
`
`—lIIIIIII—
`
`llllll\1_mpéojo"._\a//1.345Imn.mEzEEE.Oz//ms_<w\4,2MH\1II22I\/
`
`Em;_aomoomm_
`.uIIIII.__53%.852;_|\muzmhmsfifi
`
`oomv
`
`20>Im_._m<._.mm
`
`
`
`41—(0z._.wn_m0
`
`2.GE
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 17 of 19
`
`US 8,031,849 B1
`
`0:29,
`
`C?TOHSERIHIL
`
`1 NEWER-IONI
`
`XIOOTTO
`
`
`
`
`
`
`
`
`
`
`
`
`
`?09),
`
`HOEWE'dS
`
`HOEWE'dS 1 TldNI
`
`
`
`
`
`?JO 10B.J. BOJ
`
`

`

`U.S. Patent
`
`Oct. 4, 2011
`
`Sheet 18 of 19
`
`US 8,031,849 B1
`
`
`
`
`
`
`0021),
`
`
`
`(S) MEAMES
`
`
`
`(S) NBANES
`
`EKONEIXIE-INOO
`
`
`
`(S) MEAMES
`
`CIELVOICIENCI
`
`09/1],
`
`09/11,
`
`
`
`NOIS MEANOO
`
`TOOO1O\ld
`
`(S)AVNAELVS)
`
`(S)AVNAELVSD
`
`d?S
`
`SINESOV
`
`

`

`U.S. Patent
`
`11no
`
`1teehS
`
`nv
`
`US 8,031,849 B1
`
`2a22452aonOz
`
`one
`
`
`
`“0....10:20.2
`
`>4<Eoz<
`
`OhE<nDn<
`
`
`
`.120mozwmmu—ZOU
`
`mg:
`
`
`
` ._<_oms_um5:5UmoBuznmmfHomzzooma
`
`zO_._.o<
`
`><>>.n
`
`w>J<EOZ<
`
`982
`
`mhwr
`
`mm»?
`
`own.
`
`mou—mwoOh
`
`m>=<zmm5<
`
`oz_._.__m
`
`EmsEmE
`
`2w
`
`oz_._.__m
`
`o_._<>
`
`
`
`how:zoom—D
`
`>hm<a
`
`..4.2020
`
`>P¢<EMNDZFFZOQ
`
`92.32%>438%
`
`2
`
`zmwmr
`
`ms:82
`
`83.
`
`av.0."—
`
`Abn—
`
`oo<>N.52
`
`onEmoo<mm>mmm
`>.E<n_mozmmmuzooz3443oh.126azmm
`
`
`
`$322
`
`3350h.55960mma
`moznozz<o.EEK3.53
`
`
`Ammatmsu.hzmsmozaozz<
`
`m>_uomm
`
`mm?33
`
`on:mg:
`
`KENS
`
`$3.20
`
`emar
`
`32.83
`
`53o.H.302.
`
`83.20352.
`
`
`
`.Ammztkfihmflfiwm
`
`
`
`
`
`
`
`
`
`

`

`US 8,031,849 B1
`
`1
`TELEPHONY SYSTEM AND METHOD WITH
`ENHANCED FRAUD CONTROL
`
`RELATED APPLICATIONS
`
`The present application claims priority based on these
`related Provisional Applications:
`1. IP-Based Telephony System and Method, Ser. No. 60/607,
`447, filed Sep. 3, 2004;
`2. Telephony System and Method with Improved Validation,
`Ser. No. 60/676,155, filed Apr. 29, 2005;
`3. Telephony System and Method with Improved Call Moni
`toring, Ser. No. 60/676,153, filed Apr. 29, 2005;
`4. Telephony System and Method with Improved Caller
`Access Control, Ser. No. 60/676,151, filed Apr. 29, 2005;
`5. Telephony System and Method, Ser. No. 60/676,154, filed
`Apr. 29, 2005;
`6. Telephony System and Method with Improved Fraud Con
`trol, Ser. No. 60/676,152, filed Apr. 29, 2005;
`Each of these provisional applications is hereby incorpo
`rated by reference for all purposes in the present application
`as if set forth in its entirety herein.
`In addition, other related non-provisional applications filed
`concurrently with the present application are:
`8. Telephony System and Method with Enhanced Call Moni
`toring, Recording and Retrieval, by W. L. Apple and T. E.
`Pabon:
`9. IP-Network-Based Telephony System and Method, by W. L.
`Apple, and T. E. Pabon;
`10. Telephony System and Method with Enhanced Validation,
`by W. L. Apple, T. E. Pabon and J. V. Townsend;
`11. Telephony System and Method with Enhanced Caller
`Access Control, by W. L. Apple and T. E. Pabon;
`12. Telephony System and Method with Improved Fraud Con
`trol, by W. L. Apple, K. J. Gumbiner, T. E. Pabon, and W.
`Ryan.
`Each of these concurrently filed non-provisional related
`applications is hereby incorporated by reference for all pur
`poses in the present application as if set forth in its entirety
`herein. In the sequel, the above-identified related incorpo
`rated applications will be referred to by the paragraph number
`in which it appears, e.g. incorporated application 1, or incor
`porated provisional application 1, is a reference to IP-Based
`Telephony System and Method cited in paragraph 1 above.
`Because each of the cited concurrently filed applications
`incorporates all of the others, but none incorporates itself by
`reference, the corresponding paragraph number for the
`present application is intentionally omitted.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`FIELD OF THE INVENTION
`
`The present invention relates generally to the field of tele
`communications. More particularly, the present invention
`relates, in one aspect, to voice and data telecommunications
`systems and methods. Still more particularly, aspects of the
`present invention relate to voice and data telecommunications
`systems and methods for use in providing collect, pre-paid
`calling or other billing options. Yet more particularly,
`embodiments of the present invention relates to such telecom
`munications systems and methods as applied to inmate tele
`phone calling systems and methods for providing telephone
`calling services to inmates in correctional and other confine
`ment facilities. The terms confinement facilities and correc
`tional facilities are used interchangeably in this application.
`
`BACKGROUND OF THE INVENTION
`
`Various telephone calling and billing arrangements have
`been developed over the long history of the telecommunica
`
`50
`
`55
`
`60
`
`65
`
`2
`tions industry. From operator-controlled local and long dis
`tance calls to automatic direct dialing to newly emerging
`computer telephony calling over data networks, and from
`plain-old-telephone service (POTS) to collect calling, to call
`ing card, toll-free calling and pre-paid calling—among many
`others—the telephone industry has been continually seeking
`to apply new technologies to provide new and more flexible
`telephone calling services.
`Electronic and optical switching, transmission, signaling,
`and database storage of many kinds have expanded the reach
`of telephony techniques to many new and enhanced applica
`tions. These and a variety of processors and other facilities
`embedded in, or linked to, more traditional facilities in the
`Public Switched Telephone Network (PSTN) have still fur
`ther enlarged the spectrum of telephone services available to
`the public.
`One telephone service area that has developed rapidly in
`recent years is that of providing telephone communications to
`inmates in jails, prisons and other confinement facilities,
`sometimes referred to as Inmate Calling Services (ICS).
`While ICS contexts involve functions in common with every
`day home and business calling, and with calling from public
`facilities such as airports and hotels, special issues arise that
`are peculiar to ICS. Thus, for example, controls over timing,
`duration, allowed called destinations, and billing—among
`many others—must be addressed in planning and implement
`ing ICS.
`An important goal in providing ICS is call efficiency—
`despite the need to observe the many constraints characteris
`tic of ICS calling. Thus, for example, automation of call
`setup, monitoring and billing processes for ICS is of high
`importance. In particular, since collect and other special bill
`ing arrangements are common in the provision of ICS, avoid
`ance of costs associated with human operators to provide
`step-by-step controls for ICS has long been recognized. U.S.
`Pat. No. 4,054,756, issued Oct. 18, 1977 to Comella and
`Yokelson discloses a system and method for automating
`many operator services, including playing of recorded
`announcements, collection of information from calling and
`called parties, call setup and billing based on such inputs. Use
`of functionality like that described in the last-cited patent has
`therefore found application in the provision of ICS.
`As computing power has greatly increased and been made
`available in the form of now-ubiquitous personal computers,
`the Comella, et al. teachings have been adapted to provide
`much of the computing power used to provide ICS. In par
`ticular, providing ICS to inmates in confinement facilities has
`lately been accomplished through the use of analog telephone
`station equipment (usually hardened versions of basic home
`or office telephone sets) connected to one or more personal
`computers located on-premises at correctional facility loca
`tions. Such computers are used, among other things, to con
`trol telephone access to the PSTN, record conversations as
`appropriate, and to generate and record Station Message
`Detail Reporting (SMDR) data for use in billing calls made
`from the correctional facility.
`FIG. 1 shows a functional network diagram representation
`of a typical prior art ICS systems, including apparatus
`installed at a correctional facility connected to the PSTN. In
`particular, a telephone facility 100 is shown as including a
`plurality of analog telephone sets 101-i, i=1, 2, . . . , N.
`illustratively connected to control computer 110. Telephone
`sets 101-i and computer 110 may be physically located in
`different areas or different buildings of a correctional facility;
`more than one control computer 110 may be employed if
`required to meet calling volume at the facility. Control com
`puter(s) 110 located on-site within an illustrative correctional
`
`

`

`3
`facility are typically connected directly to the PSTN via on
`site analog loop-start telephone lines or, in some cases, mul
`tiplexed digital connections, e.g., T1 carrier links. Personal
`computer-based control computer 110 typically includes a
`plurality of peripheral interface cards to accomplish connec
`tivity between the analog stations and the PSTN. Illustra
`tively, Intel Dialogic D/4PCI cards are used to interface to up
`to four input telephone sets per card. In some applications, up
`to 16 such cards can be used in a single computer to provide
`access to PSTN 120 for up to 64 telephone sets. Other par
`ticular Intel cards can provide much higher line coverage.
`While the illustrative Intel cards provides functionality for
`detecting ringing associated with incoming calls, ICS calling
`is typically limited to providing only outbound calling from
`the correctional institution.
`The one or more control computers 110 at each correc
`tional facility site, in cooperation with PSTN functionality
`provided off-site by local and long distance telephone com
`panies, control the sequence of events required to complete
`ICS calls originated at the correctional facility site to called
`parties connected to the PSTN. Such calls are typically either
`collect or debit/prepaid telephone calls to remote called par
`ties identified by inmates using the facilities shown in FIG. 1.
`In FIG.1 the PSTN is represented as cloud 120; parts of PSTN
`120 are shown outside this cloud to emphasize the part they
`25
`play in completing the call. In particular, illustrative PSTN
`switches 140 and 145 are shown serving representative sta
`tions, shown as telephones 170 and 160, respectively, in FIG.
`1. Telephone station set 160, by way of example, is indicated
`as the called party’s telephone set.
`The owner or provider of the on-site telephony equipment
`and ICS incurs purchase, operation and maintenance costs
`associated with the completion of such calls, and seeks a
`profit by charging a rate for ICS calls that repays both the
`fixed costs (equipment, maintenance and other) and the vari
`35
`able per-call costs that the provider incurs for use of PSTN
`120.
`As will be appreciated from the foregoing, control com
`puter costs, telephone line use costs, and maintenance costs
`associated with ensuring a high level of system up-time at
`many geographically distributed (on-correctional-site) instal
`lations—each including complex computer hardware and
`associated software—can be burdensome and expensive.
`Voice over IP (VOIP) techniques using the Internet or other
`data networks offer possible alternatives to a range of existing
`business and residential communications systems. In particu
`lar, VOIP systems are emerging as candidate implementa
`tions for a variety of enterprise communications solutions.
`One illustrative example of such systems is available from
`Quintum Technologies. Residential use, as illustrated by
`AT&T’s Call Vantage VOIP service over high-speed cable
`connections, and digital subscriber line Internet connections
`by local exchange carriers and others, is also emerging as a
`possible alternative to local and long distance calling using
`traditional Plain Old Telephone Service (POTS). A formal
`XML Schema for IP-based voice telephony service is
`included as Exhibitipdr-1 in incorporated provisional appli
`cation 1.
`A particular aspect of collect, bill-to-third-party, and calls
`involving other particular billing options is that of billing
`validation. Billing validation relates generally to validating
`the availability of identified accounts for billing of a call, and
`has proven to be especially important for inmate calling.
`Thus, for example, validation is commonly sought for collect
`calls to determine that the account, including called party
`account numbers, exist and are of a class for which billing can
`be accomplished by one or more billing entities. In some
`
`55
`
`40
`
`45
`
`50
`
`60
`
`65
`
`US 8,031,849 B1
`
`10
`
`15
`
`20
`
`30
`
`4
`cases, as, for example, for at least some calls to a called party
`at a cellular account number, it is often difficult to ensure
`billing for the benefit of an ICS provider placing the call on
`behalf of a calling party. Often bills for calls completed to a
`variety of called party destination types prove to be uncol
`lectible unless complex, expensive and time-consuming vali
`dation techniques are used. Further, these techniques are
`applied in prior practice even when a call is not completed, as
`when the called number is busy or a called party fails to
`anSWer.
`Because of the rise in popularity of cellular and other
`portable telephone devices, many of which do not provide
`billing collection services for calls placed by wireline ICS
`providers, an important step in insuring payment for ICS is to
`verify the type of service subscribed to by the called party for
`ICS calls. Perhaps even more important in this regard is the
`rise of CLECs or Competitive Local Exchange Carriers, who
`often lack the ability or inclination to provide billing collec
`tion for calls processed by an ICS provider. CLECs are to be
`contrasted with the traditional incumbent local exchange car
`riers (ILECs), such as a Regional Bell Operating Company
`(RBOC).
`Some estimates report that upwards of 20 percent of calls
`sought to be completed by ICS providers are ultimately to be
`completed by CLECs. When combined with mobile services
`such as cellular telephone services for which billing is some
`times problematic, the combined percentage of calls poten
`tially associated with billing problems can easily approach or
`exceed twenty-five percent.
`To help reduce the number of calls completed to telephone
`stations associated with cellular service, CLEC and other
`services that do not ensure collection and payment of charges
`for ICSs, and for other service providers concerned about
`billing of charges for services rendered, a number of data
`bases are maintained by the telephone industry for checking
`the status of particular telephone lines. In particular, so-called
`Line Identification Databases (LIDB databases) provide a
`variety of information for telephone lines. Thus, a database
`query launched to a LIDB or similar database for a call can
`provide some information relating to whether calls to a par
`ticular line (and the account and phone number associated
`with it) can be counted on (or not) to be billed by the number
`provider.
`Other databases having special information about particu
`lar telephone subscriber accounts may also be maintained,
`including, generally, a class known as billed number screen
`ing databases or by other particular names. Some of these are
`maintained locally by service providers based on past history
`of payment, credit or other factors. All of these may help
`service providers, including ICS providers, to increase the
`share of calls that can actually be billed, thereby increasing
`the share of calls for which charges are actually collected.
`As might be expected, use of LIDB and other telephone
`line or account databases by service providers seeking infor
`mation about particular telephone lines or accounts incurs
`charges by the providers of such databases. Since data com
`monly found in such databases is available more easily to
`some industry participants than others, concern is sometimes
`expressed by those querying the database as to these charges
`and conditions associated with use of the databases. In par
`ticular, a significant percentage of calls for which line or
`account databases (hereinafter, LIDB databases) are queried
`(i.e., for which so-called database dips are performed) prove
`to be no-revenue calls. This no-revenue condition can arise
`because the LIDB data raises issues about the likelihood of
`being able to bill for the call. For example, the unlikely ability
`to bill for the call may be indicated by a database response
`
`

`

`US 8,031,849 B1
`
`5
`indicating no data is available for the particular line/account
`(hereinafter, line). In some cases, it is possible to arrange for
`alternative payment methods by which a called party can pay
`for received calls, even if such payment options are not
`reflected in the LIDB database response. But by the time such
`arrangements have been made, a LIDB dip may well have
`been performed, and a cost to the ICS provider incurred.
`Further, even if the line information received in response to
`a LIDB dip appears to warrant the completion of a call in the
`expectation of being able to bill for the call, the call may not
`be completed, e.g., because of a busy line or a no-answer
`condition at the time of the call. As to conditions associated
`with LIDB services, it is often required that even successive
`calls to the same number must employ a separate LIDB dip,
`thus incurring multiple charges for the same information over
`a short interval. Moreover, storage (or caching) of prior LIDB
`dip results is typically discouraged under contracts with
`LIDB database providers. Thus, ICS and other service pro
`viders incursubstantial costs for LIDB services, even for calls
`or call attempts for which no revenue will be derived by the
`ICS provider.
`In yet another way that ICS providers incur costs without
`deriving any revenues involves so-called billed number
`screening (BNS). Callers attempting to place a third number
`billed or collect call to a line equipped with BNS will be
`advised by an announcement that such billing is not autho
`rized and another form of billing is required. Such need for
`alternative billing arrangements may not be determined
`before costs of call setup and LIDB dip has been performed,
`thus incurring cost to an ICS provider. It is obviously prefer
`able that such alternative billing arrangements not be negoti
`ated on each call to a BNS line.
`It is therefore desirable for network users, such as ICS
`providers, to ascertain with increased certainty that calls
`placed can be billed. Moreover, it is desirable that such calls
`incurrminimum costs to the provider and provide convenience
`for calling and called parties to an ICS call.
`A need therefore exists to provide flexible and economical
`validation of billing status for called parties or others relied
`upon by an inmate to pay charges for ICS calls.
`A continuing problem in ICS is that though an original
`called party (e.g., an inmate’s lawyer or an approved family
`member) can be qualified by correctional authorities to
`receive inmate calls, such calls can sometimes be forwarded,
`extended, bridged, or otherwise connected to other parties
`who have not been so qualified. A primary mechanism for
`permitting calls to such not-qualified persons

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket