throbber
111111
`
`1111111111111111111111111111111111111111111111111111111111111111111111111111
`US 20130263227Al
`
`(19) United States
`c12) Patent Application Publication
`Gongaware et al.
`
`(10) Pub. No.: US 2013/0263227 A1
`Oct. 3, 2013
`(43) Pub. Date:
`
`(54) SECURE COMMUNICATION SYSTEMS AND
`METHODS
`
`(71) Applicant: TELMATE, LLC, San Francisco, CA
`(US)
`
`(72)
`
`Inventors: Grant Gongaware, San Francisco, CA
`(US); Nicolas Garcia, Oakland, CA
`(US); Richard Torgersrud, San
`Francisco, CA (US); Peter Kelley
`Sheerin, Foster City, CA (US)
`
`(21) Appl. No.: 13/844,281
`
`(22) Filed:
`
`Mar. 15, 2013
`
`Related U.S. Application Data
`
`(63) Continuation-in-part of application No. 13/088,883,
`filed on Apr. 18, 2011.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`H04L29/06
`(52) U.S. Cl.
`CPC ...................................... H04L 63108 (2013.01)
`USPC .............................................................. 726/4
`
`(2006.01)
`
`ABSTRACT
`(57)
`Systems and methods for determining whether a communi(cid:173)
`cation session is authorized are provided. In some aspects, a
`method includes initiating a communication session between
`a first user and a second user, and obtaining an identity
`attribute associated with a third user engaged in the commu(cid:173)
`nication session. The method also includes determining
`whether the third user is the first user, the second user, or an
`unauthorized user based on the obtained identity attribute.
`The method also includes determining whether the commu(cid:173)
`nication session is authorized based on whether the third user
`is determined to be the first user, the second user, or the
`unauthorized user.
`
`2.5
`-r..J
`
`_...,.----....\
`
`\
`
`\J
`Internet
`·.
`90
`1
`'\,
`
`\,
`
`\
`l
`--...
`\\
`
`\
`
`,
`
`.
`
`---~----····-
`
`Facility B
`
`104
`
`/
`·"/
`
`l
`
`'
`
`/
`·'
`
`}"'-.. r/\
`
`j
`I
`1
`/'----~/
`\.....J
`
`100 ~'--------·····---······---····---·
`r;;::-·-~ I ~ ~ \
`~~~ Foclltty A
`
`120 ·~~~~r , ·--·····-~<
`I i
`102 t - - -
`______ ..1
`l
`~
`100 ~
`\
`_j
`~~. ~--··--
`'j Router ···~: -
`J~~ Process1insgoCenter ........ \.
`I ----------.. _.
`1..
`,
` K~osks ,
`-----f.-
`l __ :-··
`[_____
`-
`./~ '
`_...
`~~
`102 ________ 1_2_0--1·
`------r
`:
`--------
`- __....,--·--l..._
`...,..----------
`"""'
`~..._~
`.
`(
`...--·-.....r-·--~·---..... \
`VOIP-to-POTS ~\ ... /
`r:-_
`·' .:r
`·d
`(
`~--~ /,.,/
`~'\
`TELCO Provider
`Prov1 er
`, ""~-(~OTS Providers}
`("_;
`.--·-
`r-..,..
`-,
`... _ 110
`- ......... ~-~~_:?"--·· .-..:~-.: _____ '-...._.../'---------
`
`\
`
`=~~-~ / _..
`
`...
`
`, :
`:
`
`1:
`
`r----······
`:\ Party B
`181
`
`GTL 1008
`PGR of U.S. Patent No. 8,855,280
`
`

`
`(')
`
`~ .....
`
`'"= ~ .....
`('D = .....
`~ 'e -....
`.... 0 =
`~
`0' = (')
`.... 0 =
`
`~ .....
`
`0
`(') ....
`
`~(H
`N
`
`0 ....
`
`(H
`
`('D
`('D
`
`rFJ =(cid:173)
`.....
`....
`0 .....
`N
`0
`
`c
`rFJ
`N
`0 ....
`..._
`(H
`0
`N
`0\
`(H
`N
`N
`-....l
`
`> ....
`
`l
`! ~-----~
`Kwsks
`i
`102 r~---
`
`100~
`
`L.
`
`... ____ ......._:
`
`_ ... _________ - - -
`
`facility A
`
`120
`
`25
`
`~ 1\
`01 (V 1
`
`·\ Internet ~
`\._
`190
`\
`\\.
`~
`1 Processing Center
`
`'
`
`\
`·--··
`
`100 '-...,__
`~-·· 'I
`
`Kiosks
`102
`
`..
`
`Facility B
`-------------------------------~
`
`120
`
`Router
`104
`
`I<
`
`I
`
`; ·-··-··-·-.. J
`[:~J 152Jq ~R _
`-~ l
`
`150
`
`. .... ...J L
`"
`/,./
`
`= 1
`
`
`I
`
`.,..·
`
`... ---
`
`.
`
`_,...
`
`~
`
`Party A ..
`180
`1
`>---.. ::...._j "- r~-~ VOlP-t~~POTS
`... t .. ---
`m .,_{POTS Providers~
`TELCO Provider ~ Prov1der ·
`~1
`__ ..,. ......... ·
`160 , ........ ~·""
`J
`___ ,. ______ ,._..·
`_ /
`.............. -··-~70
`~= ··-
`-------...___.../""--·----
`Figure 1
`
`/
`... ~·
`
`-v~
`
`\
`
`)-
`
`:
`
`

`
`225
`250~ !'"''"'•"'"'"'"'""''""""'"'""'"''"'''''"'••--······---·~~::~~=====::~::~:~::::~:~:::::~----.-................. ;··--·1
`.rJ

`'I
`! !
`1 ..... Facility A ----1
`I 251
`Cluster A
`
`~./'~---. ---..../,"-.,. /"'....----....._,\ 1 ;:--~artfU:>)J ~ r~ro~assln£-~GJ r·~~atlor.') ~~::~:-ll ~
`~
`200 U,!jf Ro,:er -~ ~l=ato~ \
`!, · ~;' ..... ~ j_
`~:=___j
`
`•;:
`
`)
`
`257
`
`. r
`
`'
`
`Investigator
`
`)
`
`Outside
`
`f
`
`il'llancer
`
`i
`
`i
`
`j
`
`j
`
`[
`
`~0~:~~--l \--\ "-/7_-/ ~ 1 J252~--~5~ . ..:::..~-1r-B-1 .......... ;l
`
`20~1' 102 tt Router \~ . \
`------- -----'/
`204
`\
`'-----~
`
`:
`
`.............
`
`/
`
`\
`
`r--·
`
`\
`
`200 1
`!
`
`•••
`
`I .
`
`.
`
`256
`
`-
`
`i 257
`L__
`
`!
`'
`
`!
`
`L
`i Oatabasj
`258
`----
`
`.. ---- . .
`
`""-
`
`i r Slnart load '; t!alic!!S~~ng i I Application
`Balance< I f'roC!!s.n<tg I
`I
`\
`~-
`\
`I
`';.~~-y ~ _}?L, 255
`~-....
`~
`) l
`.....

`!
`:j)
`--------------~
`·1
`I
`290 ~/ l
`f2s3
`i r ,.., ~ .. ,, , "~..... , """'"'" , I ,. .... ~ ,
`Cluster C
`J_J" r----......, t~, r=::'l
`'L 1
`~ \
`l j
`j
`i
`VOlP-to-POT
`257 J
`\ ~ 255
`I i
`i
`\
`Provider
`, 256
`)
`260
`:
`: L ____ ::..::.__j
`-------------
`-' -----------------
`\\ l
`;
`¢ ---------
`TELCO Provide
`(POTS providers)
`~~10 ~ J, 1 254
`' \ ~------~ (..--------~

`( 5m~rt loac:l '! Rll!l<:&sslng
`l
`~~ !
`~.
`i l Procasslng
`
`(
`Kiosks
`R~uter 'r---~
`102
`"~ ;7}
`____ =:::.::.;
`~~ FacHitv D
`i
`------~
`'
`.....
`_...
`i
`,
`//
`~ fK
`· __ j I
`20 L .... ~~ Router f
`__ ________;
`I ~ j
`.
`-------
`lOO L~~~;·j m : ~ 25~ ~ 256 ____ ~=:::~~=-~~~~=- __ x
`!
`----------~~ I
`M r·
`
`--..
`
`t.04 ______ ___\
`
`l<losks
`
`: '
`
`\
`
`/
`
`204
`
`1
`
`!
`
`Facility E
`!
`
`71
`
`r
`
`\
`
`\1.
`
`Balancer
`
`A\
`
`1
`
`Bal;sncer
`
`[-----
`
`~ ................ -... .. . ... ~- ... ·-- ·-·~···
`
`.
`
`figure 4
`
`j
`258 __ __j
`-------·
`
`-----------------
`
`Cluste~ 0
`(...---- \
`App:Jc..tlon 1 j
`!
`
`.
`'
`

`
`I
`
`I
`
`( o~tabase "-
`i ll J i
`
`(')
`
`~ .....
`
`'"= ~ .....
`('D = .....
`~ 'e -....
`.... 0 =
`~
`0" =
`.... 0 =
`
`(')
`
`~ .....
`
`(')
`
`0
`.....
`~(H
`N
`
`0 ....
`
`(H
`
`('D
`('D
`
`rFJ =(cid:173)
`.....
`N
`0 .....
`N
`0
`
`c
`rFJ
`N
`0 ....
`(H ---0
`
`N
`0\
`(H
`N
`N
`-....l
`
`> ....
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 3 of 20
`
`US 2013/0263227 A1
`
`)0 \
`
`J_,,tre 3
`
`v
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 4 of 20
`
`US 2013/0263227 Al
`
`(L(()O
`
`ROM
`
`!itD
`
`CPU
`
`Tbvv~
`5G,f'e1n-
`41~ .fn+ut4CC.
`
`H~A
`'1l'f Ptsk
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 5 of 20
`
`US 2013/0263227 Al
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 6 of 20
`
`US 2013/0263227 Al
`
`This sf:3tls.)rt is re.seroed fuc
`
`v $e.r A
`
`fro:'n
`;!fJ(lpm-3:00pm
`
`Pod 8 At:tMty
`
`>3-:lSpm~New~JM~f"t~n;S:nl>:h
`>3:1~..m·~Newm~~~~S>!-frnl(p_n.J~~~
`:;. 3:'l3prr:" Jt,'2 i'2:0:pot'~~XJr·~~,QI !<>Mrel'\
`>l-1~-~~k..;-Wl\f~):\)1
`)o)JJ~'"'ln.::o.~i'l2';!:lf'ilfJ~"t~
`> ~:00 prn~k~~:!'lg ~:Vtlb"W.R~ohmoo
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 7 of 20
`
`US 2013/0263227 Al
`
`;~~;;;;:::~~ [g]+.. 705
`
`':>l:lSr.m~l<lb!!~f~IMIJd:omt
`::.J~1<Jpm•l'k'lli~.1:UrY8l!k!lv"Mn
`:-3:\Np~·,l~ad:focJo.'mSmrth
`;... ;1:08pM ·inwrnll'lgta8b 'MR Johr.s¢
`
`tog:n
`
`~====~~~~~-~-~
`
`RePe;.rt: Prompt
`
`Help
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 8 of 20
`
`US 2013/0263227 Al
`
`Welcome Ken Jones
`
`IDCheck:
`
`lift handset and speak your voice verification phrase •.
`
`. L......
`
`login>
`
`Login wm be cancell~d in 15 seconds.
`
`Help
`
`··1
`
`E<pai\ol
`
`'
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 9 of 20
`
`US 2013/0263227 Al
`
`Welcome Ken Jones
`
`IDCheck:
`
`Please tine up your
`eyes with the marks
`and remain still.
`
`Login will be cancelled in 15 seconds,
`
`c······
`
`Verify>
`
`e Volume
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 10 of 20
`
`US 2013/0263227 A1
`
`_ . ..,..__...... ........... -.... ..,. ... ___
`
`--""- ~~ T-l'h<mO~.i"'~
`
`.lbOI
`
`.U.C.l
`
`filiJO)
`
`.ICO"'
`
`J lOll
`---------.
`frl~1u!fl1 3:1~ I
`.1¢05
`
`Phone
`
`.'Se<ured
`!fitemet
`
`.IOC' .. 1007
`
`t. ... <il t.:~--<t.d
`
`iele-M<!dica!
`
`·M~~!l9
`
`wort •
`
`<l>'d<rCtlln~ry
`
`VIJ.eo
`
`• lbO<f
`
`£J!I.u.-ks:-...
`
`~~t;~t.rJS
`~ .... , "'e}
`
`l()j () ••
`
`fleamJ;,l(i~
`
`~-----.-~-----:.:;;:::------_:::----.:::--:;,;,;····~
`
`: :
`
`logout
`
`Volume
`
`:
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 11 of 20
`
`US 2013/0263227 Al
`
`Yoo how 3U =><~; <:» 'l'l>ke ~call.
`Oiil!Now
`
`1101
`
`rQ.~~s;k_~\!!;S
`
`Customor .Sen<ite
`PREA
`~PREll l!>ddent
`
`411
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 12 of 20
`
`US 2013/0263227 A1
`
`r::l Volcemail
`L.:=::J
`.
`c······~.-.-~· ...........
`I > l~~
`II
`
`AUf' II
`
`4l!Y10@3:12pm
`
`4/12/11) @ 3:00pm
`
`I
`
`(.SOS) 111-1234
`
`\626) 555·1212
`
`/
`
`Jll~o:h· c,,
`1 "-:'.~Tk J.
`Indiana Janes
`
`,;'ley!.<'!
`
`v !
`·~
`
`lUJ't
`
`!<OI'»/<1$<
`
`llol'»/<!.<1<
`
`NO!'io><Wt
`
`Nol'l!l}~tdt
`
`Nof'!;oy>l.otl:
`
`41101Hl@ 1:00pm
`
`(714)123-2341
`
`418/iO@ tl:12am
`l 4/5/l()@ 7:il2am
`l
`l 3/12/IC@ 8:01am
`
`(815) 135-.5613
`
`JemwJones
`
`121?.1135-1356
`
`(6.~0) 133-- !)51
`
`<ll~r
`
`:Vl:l/1G@1:21pm
`
`(800) 135·l:!S1
`
`Don Draper
`
`\
`
`N<l~4Cf.'l~
`
`c:._ .......
`
`:UQ/113@6:0~
`
`(866)121-1}~?._.
`
`vOOWNv
`
`==:J
`
`Mom
`
`..
`
`c.:lll><:<
`
`/'
`~·-~~--~
`'X i
`~!b:~ :X!
`~
`;!
`c.;t&><:k X
`--------'"-
`.:.Hi!¥.k X
`-
`Odl!bt<t X
`{A!;~ X
`c&l~ X
`
`$
`
`$
`
`$
`
`$
`
`$
`
`-----
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 13 of 20
`
`US 2013/0263227 Al
`
`---------··------····---······------
`r=l Bail Bond Companies
`Bail Bond Companies are displayed
`L~
`In random order,
`
`T-»<ii?>ni>l
`AAA !!u:lds United
`~~0~
`Ooul:>!e A Sa!! !lond< .
`.. ~~
`~~lt'oV"~
`~~!_~f!1S
`-
`.. l:olol
`FilS! Bali Bond>
`l'ootlltot»sl
`(;niden !i~ Sr.!i Sond!i
`'r:::K!U.t~~
`Ja!l l'londs Plus
`i<>l<htoORI
`ll~t!l=:!s .........
`~:0'~
`S:>rur•ll Free ll3ll Bonds
`
`!
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 14 of 20
`
`US 2013/0263227 A1
`
`f 1'101
`
`Chatles Jones
`
`Hang Up
`
`Save Snapshot
`($0.25)
`
`AI~~:..,Jv.t~2R ~-.. st:~e!.t turea::-td"c!l~N".O
`morOtcoil\l; ~~tfvf
`ptMidg~ t:')M:m:!"[<:~tlo."\s~~:t ;m
`.;c~:iJ>.4di~t.
`
`l
`e - -
`
`Logvut
`
`My.'I<CWSlt
`
`Main Menu
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 15 of 20
`
`US 2013/0263227 A1
`
`r---1 Recording
`I <<!
`
`L_ j
`
`1:30 remaining
`
`Stop Recording & Save
`
`...
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 16 of 20
`
`US 2013/0263227 A1
`
`l«<,joNo¥"i.
`
`"H"1lv~ R~l(:>l'V~d Oitt -~Ulpm
`
`r'f'~~Jul>'3! s::stm
`
`.. J
`
`-::~=~ r;
`~~~#~ .. ~
`Q.,m~ .. l
`
`. ._,.,.,.
`< BKttes
`I
`··::-iott-4 lr-;.;,;~
`2 PlAYs Left i
`II KM-.."J ! lG!<Ilw>d<d
`
`AUf' I\
`.......... ,. ....
`4/12n Q @>3:12pm
`
`"'
`
`1 Plavleft
`Kltt'~~
`Nof'lavs
`l<m-~
`Nul'!ays
`t:!t<~:og
`No PI~\.,.
`~~''t9
`No PI;,"'>
`IO!»F.~.g
`No Plays
`IGI<!?-'<lfo!!
`No !'lays
`
`411 '211 0@ 3:00l3m
`IO«Ro<«<bo!
`4,tl(l/10!j;3~
`-~---
`lGWR••••:!d
`4/S/H.l® 11:1 2am
`
`...,-.~
`
`4/SflO ii!7:()lam
`;()<&~
`3!1l/10e M2am
`I<!!•~
`3{12/1 0@ ~:.4JB.!!!.
`Kit>o!lo<o:dtd
`2/6!1 0 @ 6:00um
`
`IGI<!~
`!'I <me
`Kk<R«pooS<
`N~·-··········----·-
`lilt•~
`4/1011 c ~ 2:()\lpm
`l<if•~
`4/8/lO@ 11:12-clm
`KJt.l!>""""'"'
`4/6/10 llJ>7:\fl~--
`i p_m~:
`IO!•~()i$ll:C2Qm
`l~.a~
`IC<•R.,..,.
`3/12/10@7:2:'1l j~~~-·
`i<lt<=~6:00
`
`l!ol<dftoop-
`
`~R~»e
`........ .,.,.
`
`r
`
`..
`
`vDOWNv
`
`IG
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 17 of 20
`
`US 2013/0263227 A1
`
`J 110\
`
`MuhMd Gm"J<J!ii"!l Edut.>tloo (265)
`emwsebyReglont1~l
`
`llr-Bv_Cal_wr_«_or_Gr®P __ (2_®_l - - - - - - - - · 0 fdu!'<llnr.com-www.edll!'<llnt.a>m
`
`BySISbjt'rtl!l(!$)
`!'----------··-···················
`!1 ~t.<oami~~g{180l
`I! Hlgb<!rEl:!Ueati®(l717nl
`1:
`· i K·12 (5111 Sl
`
`10 011~. v~.<ci~com
`10 ApolloGroop·W>'JWJtpol!~u
`0 ~USII£om·v.-;:!;ss.'l5usa.<nr~
`0 ~C:">nsultln;i·~wm
`0 Cl'E~Siomolcduc;Jiiun SeMca>i·WW'k~'P'<S.::pe.com
`0 AdllirS"(l:d<mC.!mte;Th~·www.3<fu!ISI!Kientc<mer.mm
`0 Koo-Yi • WIOIW.kn<:M.tool
`•
`0 M<>owca-Eduf.11tkm~urc<3S·
`rOSQUrres.moosta".<Omlooucotion
`
`I Save ched<ro as Bookmarks _J
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 18 of 20
`
`US 2013/0263227 A1
`
`!:Mall Friends
`
`Telmate will send a message to your
`Friends who have deposited funds for
`you befot'e.
`
`Tap the names you wish to notify.
`
`!fo nome ;mt~bk>. II':> b<tau.e til<> part)! dld not
`giWU> i>elm!SSIOO t<l ron= tmtn, ~tyou haoe ;;lt~ad>J
`~t..!f>J«<lsfromm.m
`
`---------····---
`Toorlito~
`Jack!>' Jones
`
`Send Email
`
`Cancel
`
`:1
`l
`
`f....,.idlti'J~ii
`Smlth~n
`foodttzy'Emal.!
`,_ Mithacl Michaels
`
`L..
`
`vOOWlh
`
`.•..... ]
`
`e logwt
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 19 of 20
`
`US 2013/0263227 A1
`
`co
`
`c:;",
`,.........,
`
`u
`
`~
`~
`
`<
`
`0\
`,.........,
`0
`~
`~
`
`7
`0 c-..
`
`.D
`(',1
`0
`0\
`"""'
`
`01 0
`(J\ -
`
`

`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 20 of 20
`
`US 2013/0263227 Al
`
`...
`
`...
`
`.xm
`...... 0
`0
`(1J
`:S:'t::
`.....,
`ID
`(!)....,
`Z.,S
`
`J
`
`*"'(!)(!)
`:J 0
`0
`
`:J (!)
`
`(!)
`
`:_./" .& ·:;; .g
`ooc:
`-
`
`<0
`0
`0
`N
`
`.. ..
`
`..
`
`..
`
`~
`
`..
`
`0
`
`N .
`C)
`......
`u..
`
`....
`"'<T
`0
`N
`
`..... <D8 J
`.. O..>'t::
`::lg (1J
`c
`ru m
`-oc:
`
`......
`0
`(/)
`(/')
`(!)
`0
`0 ,_
`Q_
`
`::2:
`0
`0:::
`
`...
`
`..
`
`N .,...
`0
`N
`
`J
`
`J
`
`E c
`(!) 0
`t:i E
`>,(!)
`<fJ~
`
`J
`
`'<:!'
`0
`0
`N
`
`\
`
`N
`0
`0
`N
`
`Jl
`\;
`
`C>
`o:>
`ro ,_
`0 _.
`(f)
`
`\
`
`j
`
`...
`
`..
`
`..
`~J
`0
`
`0 g
`
`N
`
`

`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`1
`
`SECURE COMMUNICATION SYSTEMS AND
`METHODS
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`[0001] This application is a continuation-in-part applica(cid:173)
`tion of U.S. patent application Ser. No. 13/088,883, titled,
`"Interactive Audio/Video System and Device for Use in a
`Secure Facility," filed on Apr. 18, 2011, which is hereby
`incorporated by reference in its entirety for all purposes.
`
`FIELD
`
`[0002] The subject technology generally relates to commu(cid:173)
`nications, and more particularly to the use of secure commu(cid:173)
`nication systems to provide communications.
`
`BACKGROUND
`
`[0003] Detention environments, such as jails, prisons,
`detention facilities, secured hospitals, or addiction treatment
`facilities, may house large populations of individuals in con(cid:173)
`finement, which presents unique administrative challenges.
`In such detention environments, detained individuals may
`frequently desire to communicate with individuals outside
`the detention environment (outside parties) such as friends or
`family members. A variety of methods may be used to support
`such communications, including in-person visits (e.g., in
`which both a detained individual and a visitor may be in the
`same room, such as in lower security facilities or for low-risk
`detainees) or in a special visitation room (e.g., where the
`parties are separated by thick glass or plastic, and may com(cid:173)
`municate via wired telephone equipment on both sides of the
`partition). The costs and security measures associated with
`these methods of communication can be significant for both
`the facilities and the visitors.
`
`SUMMARY
`
`[0004] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method is provided for deter(cid:173)
`mining whether a communication session is authorized. The
`method includes initiating a communication session between
`a first user and a second user, and obtaining an identity
`attribute associated with a third user engaged in the commu(cid:173)
`nication session. The method also includes determining
`whether the third user is the first user, the second user, or an
`unauthorized user based on the obtained identity attribute.
`The method also includes determining whether the commu(cid:173)
`nication session is authorized based on whether the third user
`is determined to be the first user, the second user, or the
`unauthorized user.
`[0005] According to various aspects of the subject technol(cid:173)
`ogy, an apparatus comprising memory and a processor is
`provided. The memory includes instructions for determining
`whether a communication session between a first user and a
`second user is authorized. The processor is configured to
`execute the instructions to: initiate the communication ses(cid:173)
`sion; obtain an identity attribute associated with a third user
`engaged in the communication session; determine whether
`the third user is the first user, the second user, or an unautho(cid:173)
`rized user based on the obtained identity attribute; and deter(cid:173)
`mine whether the communication session is authorized based
`on whether the third user is determined to be the first user, the
`second user, or the unauthorized user.
`
`[0006] According to various aspects of the subject technol(cid:173)
`ogy, a machine-readable medium comprising instructions for
`a method of determining whether a communication session is
`authorized is provided. The method includes initiating a com(cid:173)
`munication session between a first user and a second user, and
`obtaining an identity attribute associated with a third user
`engaged in the communication session. The method also
`includes determining whether the third user is the first user,
`the second user, or an unauthorized user based on the obtained
`identity attribute. The method also includes determining
`whether the communication session is authorized based on
`whether the third user is determined to be the first user, the
`second user, or the unauthorized user.
`[0007] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for determining iden(cid:173)
`tity attribute variations of a user is provided. The method
`includes obtaining an identity attribute of a first user and
`comparing the identity attribute of the first user to a stored
`identity attribute of an authorized user who is authorized to
`engage in a communication session. The method also
`includes determining that the first user is authorized to engage
`in the communication session if the identity attribute of the
`first user matches the identity attribute of the authorized user.
`If the identity attribute of the first user does not match the
`identity attribute of the authorized user, the method also
`includes: flagging the identity attribute of the first user for
`review by an investigator; receiving verification from the
`investigator that the flagged identity attribute of the first user
`is or is not a variant of the identity attribute of the authorized
`user; and determining that the identity attribute of the first
`user is the variant of the identity attribute of the authorized
`user if the verification indicates that the flagged identity
`attribute of the first user is the variant.
`[0008] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for identifYing users is
`provided. The method includes obtaining an identity attribute
`of a first user. The identity attribute of the first user includes a
`first behavior. The method also includes comparing the iden(cid:173)
`tity attribute of the first user to a stored identity attribute of a
`second user. The identity attribute of the second user includes
`a second behavior. The method also includes determining
`whether the first user is the second user based on the com(cid:173)
`parison.
`[0009] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for enhancing facial
`recognition accuracy is provided. The method includes initi(cid:173)
`ating, by a first device comprising a camera, an interactive
`session with a first user. The method also includes surrepti(cid:173)
`tiously directing the first user to engage in one or more activi(cid:173)
`ties in front of the camera such that the first user is positioned
`at a plurality of different angles relative to the camera. The
`method also includes capturing, with the camera, a plurality
`of images of the first user when the first user is positioned at
`the plurality of different angles. The method also comprises
`using the plurality of images to perform facial recognition of
`the first user.
`[0010] Additional features and advantages of the subject
`technology will be set forth in the description below, and in
`part will be apparent from the description, or may be learned
`by practice of the subject technology. The advantages of the
`subject technology will be realized and attained by the struc(cid:173)
`ture particularly pointed out in the written description and
`claims hereof as well as the appended drawings.
`
`

`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`2
`
`[0011]
`It is to be understood that both the foregoing general
`description and the following detailed description are exem(cid:173)
`plary and explanatory and are intended to provide further
`explanation of the invention as claimed.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0012] The accompanying drawings, which are included to
`provide further understanding of the subject technology and
`are incorporated in and constitute a part of this specification,
`illustrate aspects of the subject technology and together with
`the description serve to explain the principles of the subject
`technology.
`[0013] FIG. 1 illustrates an embodiment of the interactive
`audio/video platform.
`[0014] FIG. 2 illustrates the organization and interaction of
`clusters of another embodiment of the interactive audio/video
`platform.
`[0015] FIG. 3 illustrates an example kiosk for use in the
`interactive audio/video platform.
`[0016] FIG. 4 illustrates an example processor-based com(cid:173)
`puter system of the kiosk.
`[0017] FIG. 5 illustrates an example idle screen of a kiosk
`interface described herein.
`[0018] FIG. 6 illustrates an example reservation screen of
`the kiosk interface.
`[0019] FIG. 7 illustrates an example login screen of the
`kiosk interface.
`[0020] FIG. 8 illustrates an example voice verification
`screen of the kiosk interface.
`[ 0021] FIG. 9 illustrates an example facial recognition veri(cid:173)
`fication screen of the kiosk interface.
`[0022] FIG. 10 illustrates an example main screen of the
`kiosk interface.
`[0023] FIG. 11 illustrates an example phone screen of the
`kiosk interface.
`[0024] FIG. 12 illustrates an example voicemail screen of
`the kiosk interface.
`[0025] FIG. 13 illustrates an example bail bonds screen of
`the kiosk interface.
`[0026] FIG. 14 illustrates an example video conferencing
`screen of the kiosk interface.
`[0027] FIG. 15 illustrates an example video messaging
`screen of the kiosk interface.
`[0028] FIG. 16 illustrates an example kite screen of the
`kiosk interface.
`[0029] FIG.17 illustrates an example internet screen of the
`kiosk interface.
`[0030] FIG. 18 illustrates an example fund request screen
`of the kiosk interface.
`[0031] FIGS. 19A and 19B illustrate an example audio that
`may be displayed.
`[0032] FIG. 20 conceptually illustrates an electronic sys(cid:173)
`tem with which implementations of the subject technology
`may be implemented.
`
`DETAILED DESCRIPTION
`
`[0033]
`In the following detailed description, numerous spe(cid:173)
`cific details are set forth to provide a full understanding of the
`subject technology. It will be apparent, however, that the
`subject technology may be practiced without some of these
`specific details. In other instances, structures and techniques
`have not been shown in detail so as not to obscure the subject
`technology.
`
`[0034] Detention environments often have telephone sys(cid:173)
`tems installed specifically for use by inmates. These systems,
`commonly known as Inmate Telephone Systems, allow
`detainees to call individuals residing outside secure facilities,
`and such calls may be limited to pre-authorized and identity(cid:173)
`verified individuals, or may be fairly unrestricted, limited
`only by a facility-maintained "prohibited contact list," or
`anything in between. One such system is described in U.S.
`Patent Application Publication No. 2011/0317820 A1: Cen(cid:173)
`tral Call Platform, which is incorporated by reference herein.
`[0035] A detention environment may also have one or more
`video visitation systems installed, wherein specialized vid(cid:173)
`eoconferencing systems are used to allow friends and family
`members to visit with incarcerated individuals from the lobby
`of the detention environment (e.g., on-site video visitation),
`the lobby of another detention environment with a suitable
`service, or even a computer (e.g., desktop or mobile com(cid:173)
`puter) suitably equipped with a web camera and video con(cid:173)
`ferencing or web browser software. This latter method is
`commonly called "remote video visitation," and if one or
`more endpoints are handheld computing devices, the method
`is commonly called "mobile video visitation." Examples of
`these systems are described in U.S. Patent Application Pub(cid:173)
`lication No. 2012/0262271 Al: InteractiveAudioNideo Sys(cid:173)
`tem and Device for Use in a Secure Facility, which is incor(cid:173)
`porated by reference herein.
`[0036] One endpoint in these video visitations takes place
`inside secure facilities in or near the inmates' cells. Custom
`network computing terminals, such as video visitation kiosks,
`installed inside these secure facilities for such purposes can
`be hardened against physical and electronic attempts to cir(cid:173)
`cnmvent their being used contrary to the facilities' rules, as
`these are generally owned and operated exclusively by a
`single company at any particular facility, which has an exclu(cid:173)
`sive contract to provide such equipment and services to that
`facility.
`[0037] Secure facilities may require additional levels of
`monitoring and oversight that are not required when similar
`services are provided to otherpopulations.Although two-way
`video conferencing is now quite common on desktop and
`laptop computers suitably equipped with appropriate hard(cid:173)
`ware and software, and is now becoming available on com(cid:173)
`monly available computing tablets and smartphones with
`wireless Internet connections, the increased transportability
`and concomitant increased usage and propensity to share use
`of a device with multiple people increases security concerns
`related to allowing such video visitations for inmates.
`[0038] The above-described system may be used to interact
`with a Secure Social Network (SSN), as described in U.S.
`patent application Publication Ser. No. 13/438,940, which is
`incorporated by reference herein. In some aspects, the SSN
`provides a method for facilitating the exchange or transmis(cid:173)
`sion of information between members of a social network in
`which at least one member is subject to limitations of a
`controlled facility, including the steps of: receiving content in
`an electronic form from a member for display to members or
`intended members of the social network; evaluating the
`received content to determine if it is appropriate for display to
`the members or intended members of the social network;
`allowing the received content to be viewed by the members or
`intended members of the social network only if it is deemed
`appropriate for display in the evaluating step; and recording
`data relative to one or more of the receiving, evaluating, and
`allowing steps.
`
`

`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`3
`
`[0039] According to certain aspects, the SSN provides a
`system for facilitating the exchange or transmission of infor(cid:173)
`mation between members of a social network in which at least
`one member is subject to limitations of a controlled facility,
`including: a data receiving module configured to receive con(cid:173)
`tent in an electronic form from a user for display to members
`or intended members of the social network; an evaluation
`module configured to evaluate the received content and deter(cid:173)
`mine if it is appropriate for display to the members or
`intended members of the social network; a content dissemi(cid:173)
`nation module configured to provide received content that is
`deemed appropriate by the evaluation module to the members
`or intended members of the social network for viewing; and a
`data recording module configured to record data relative to
`the actions of one or more of the data receiving module, the
`evaluation module, and the content dissemination module.
`[0040] Some or all of the foregoing mentioned systems
`may generally seek specific authorization and individual
`authentication prior to each use to ensure that only inmates
`with telecommunications privileges are allowed to commu(cid:173)
`nicate, and that they are only able to communicate with indi(cid:173)
`viduals residing outside the facility and whom the inmate is
`allowed to communicate with. For instance, inmates are gen(cid:173)
`erally prohibited from communicating with judges, jurors,
`witnesses, victims, and others involved in their charges or
`convictions, as well as known felons and gang members.
`[0041] Aspects of the subject technology include the con(cid:173)
`tinuous, real-time or near-real-time use of biometrics to
`ensure that only persons authenticated and authorized as
`described above may use these telephone, video visitation,
`SSN, and/or other communication systems. In some aspects,
`secure facility operators may elect to allow all or substantially
`all communications activity to take place, save for blocking
`communications among individuals prohibited from commu(cid:173)
`nicating with each other, for the purpose of intelligence gath(cid:173)
`ering activities, which may both aid the security of the facility
`and provide law-enforcement officials with a rich source of
`information relating to criminal activities. The decision of
`which of these two methods to use may be implemented on a
`per-facility, per-wing, per-group, or per-inmate basis, at the
`discretion of the facility administrators and investigators.
`[0042] For instance, allowing communications containing
`persons who might be in a category prohibited from commu(cid:173)
`nicating with any inmate or the particular one involved in the
`communication in question, at least for one to several occur(cid:173)
`rences, may also allow for the recording, archiving, and
`analysis of small-to-large amounts of audio and video
`streams and other activity by inmates using these communi(cid:173)
`cations terminals. Commonly called "data mining," this often
`large-scale analysis of data and patterns therein can uncover
`links between and among individual users of the system that
`may otherwise have gone undetected by facility administra(cid:173)
`tors and law-enforcement officials.
`[0043] According to various aspects of the subject technol(cid:173)
`ogy, voice comparison techniques (e.g., using commercial
`off-the-shelf voice comparison software and/or other suitable
`software) may be used in novel ways to perform voice recog(cid:173)
`nition on persons using telephone and/or video communica(cid:173)
`tions related to secure facilities, such as in the case of inmate
`telephone and visitation systems, to ensure only authorized
`individuals communicate. In some aspects, facial recognition
`techniques may be used to limit and authenticate access to
`devices used by inmates to communicate with outsiders, and
`to limit and authenticate access to software and terminals
`
`capable of interacting with the devices to only individuals
`authorized to communicate with any particular inmate. In
`some aspects, tools are provided to otherwise analyze above(cid:173)
`mentioned images and/or videos on a broader basis, thereby
`allowing a catalog of all individuals and/or objects recog(cid:173)
`nized in all images and videos uploaded to the system to be
`built, regardless of which facility or individual they are
`intended for, for the purpose of creating an investigative tool.
`[0044] Voice and/or facial biometrics may be used to
`authenticate users, to identifY other persons involved in com(cid:173)
`munications sessions, and to sleuth out previously unknown
`links among users of the system. A biometrics system may be
`used to identify individuals. The system may use these bio(cid:173)
`metric profiles to identify individuals appearing in any and all
`content passing through or otherwise available to the system.
`Other software may then search for connections (e.g., using
`six-degrees-of-separation principles) to find possible links
`among inmates and their contacts.
`[0045] According to various aspects of the subject technol(cid:173)
`ogy, voiceprint matching (e.g., using continuous voice bio(cid:173)
`metrics) may be used as an additional verification step when
`inmates log into an inmate communication system (e.g.,
`Inmate Telephone System). In some aspects, the same capa(cid:173)
`bility may be used to detect when one inmate logs in using his
`personal identification number (PIN) and voice, then hands
`the telephone to another inmate. This practice may be com(cid:173)
`monly the result of fraud (e.g., a first inmate offering use of
`his login for a second inmate to avoid restrictions on whom
`the latter can call, or even an outright prohibition on making
`any calls), and also intimidation (e.g., a third inmate f

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket