`
`1111111111111111111111111111111111111111111111111111111111111111111111111111
`US 20130263227Al
`
`(19) United States
`c12) Patent Application Publication
`Gongaware et al.
`
`(10) Pub. No.: US 2013/0263227 A1
`Oct. 3, 2013
`(43) Pub. Date:
`
`(54) SECURE COMMUNICATION SYSTEMS AND
`METHODS
`
`(71) Applicant: TELMATE, LLC, San Francisco, CA
`(US)
`
`(72)
`
`Inventors: Grant Gongaware, San Francisco, CA
`(US); Nicolas Garcia, Oakland, CA
`(US); Richard Torgersrud, San
`Francisco, CA (US); Peter Kelley
`Sheerin, Foster City, CA (US)
`
`(21) Appl. No.: 13/844,281
`
`(22) Filed:
`
`Mar. 15, 2013
`
`Related U.S. Application Data
`
`(63) Continuation-in-part of application No. 13/088,883,
`filed on Apr. 18, 2011.
`
`Publication Classification
`
`(51)
`
`Int. Cl.
`H04L29/06
`(52) U.S. Cl.
`CPC ...................................... H04L 63108 (2013.01)
`USPC .............................................................. 726/4
`
`(2006.01)
`
`ABSTRACT
`(57)
`Systems and methods for determining whether a communi(cid:173)
`cation session is authorized are provided. In some aspects, a
`method includes initiating a communication session between
`a first user and a second user, and obtaining an identity
`attribute associated with a third user engaged in the commu(cid:173)
`nication session. The method also includes determining
`whether the third user is the first user, the second user, or an
`unauthorized user based on the obtained identity attribute.
`The method also includes determining whether the commu(cid:173)
`nication session is authorized based on whether the third user
`is determined to be the first user, the second user, or the
`unauthorized user.
`
`2.5
`-r..J
`
`_...,.----....\
`
`\
`
`\J
`Internet
`·.
`90
`1
`'\,
`
`\,
`
`\
`l
`--...
`\\
`
`\
`
`,
`
`.
`
`---~----····-
`
`Facility B
`
`104
`
`/
`·"/
`
`l
`
`'
`
`/
`·'
`
`}"'-.. r/\
`
`j
`I
`1
`/'----~/
`\.....J
`
`100 ~'--------·····---······---····---·
`r;;::-·-~ I ~ ~ \
`~~~ Foclltty A
`
`120 ·~~~~r , ·--·····-~<
`I i
`102 t - - -
`______ ..1
`l
`~
`100 ~
`\
`_j
`~~. ~--··--
`'j Router ···~: -
`J~~ Process1insgoCenter ........ \.
`I ----------.. _.
`1..
`,
` K~osks ,
`-----f.-
`l __ :-··
`[_____
`-
`./~ '
`_...
`~~
`102 ________ 1_2_0--1·
`------r
`:
`--------
`- __....,--·--l..._
`...,..----------
`"""'
`~..._~
`.
`(
`...--·-.....r-·--~·---..... \
`VOIP-to-POTS ~\ ... /
`r:-_
`·' .:r
`·d
`(
`~--~ /,.,/
`~'\
`TELCO Provider
`Prov1 er
`, ""~-(~OTS Providers}
`("_;
`.--·-
`r-..,..
`-,
`... _ 110
`- ......... ~-~~_:?"--·· .-..:~-.: _____ '-...._.../'---------
`
`\
`
`=~~-~ / _..
`
`...
`
`, :
`:
`
`1:
`
`r----······
`:\ Party B
`181
`
`GTL 1008
`PGR of U.S. Patent No. 8,855,280
`
`
`
`(')
`
`~ .....
`
`'"= ~ .....
`('D = .....
`~ 'e -....
`.... 0 =
`~
`0' = (')
`.... 0 =
`
`~ .....
`
`0
`(') ....
`
`~(H
`N
`
`0 ....
`
`(H
`
`('D
`('D
`
`rFJ =(cid:173)
`.....
`....
`0 .....
`N
`0
`
`c
`rFJ
`N
`0 ....
`..._
`(H
`0
`N
`0\
`(H
`N
`N
`-....l
`
`> ....
`
`l
`! ~-----~
`Kwsks
`i
`102 r~---
`
`100~
`
`L.
`
`... ____ ......._:
`
`_ ... _________ - - -
`
`facility A
`
`120
`
`25
`
`~ 1\
`01 (V 1
`
`·\ Internet ~
`\._
`190
`\
`\\.
`~
`1 Processing Center
`
`'
`
`\
`·--··
`
`100 '-...,__
`~-·· 'I
`
`Kiosks
`102
`
`..
`
`Facility B
`-------------------------------~
`
`120
`
`Router
`104
`
`I<
`
`I
`
`; ·-··-··-·-.. J
`[:~J 152Jq ~R _
`-~ l
`
`150
`
`. .... ...J L
`"
`/,./
`
`= 1
`
`
`I
`
`.,..·
`
`... ---
`
`.
`
`_,...
`
`~
`
`Party A ..
`180
`1
`>---.. ::...._j "- r~-~ VOlP-t~~POTS
`... t .. ---
`m .,_{POTS Providers~
`TELCO Provider ~ Prov1der ·
`~1
`__ ..,. ......... ·
`160 , ........ ~·""
`J
`___ ,. ______ ,._..·
`_ /
`.............. -··-~70
`~= ··-
`-------...___.../""--·----
`Figure 1
`
`/
`... ~·
`
`-v~
`
`\
`
`)-
`
`:
`
`
`
`225
`250~ !'"''"'•"'"'"'"'""''""""'"'""'"''"'''''"'••--······---·~~::~~=====::~::~:~::::~:~:::::~----.-................. ;··--·1
`.rJ
`·
`'I
`! !
`1 ..... Facility A ----1
`I 251
`Cluster A
`
`~./'~---. ---..../,"-.,. /"'....----....._,\ 1 ;:--~artfU:>)J ~ r~ro~assln£-~GJ r·~~atlor.') ~~::~:-ll ~
`~
`200 U,!jf Ro,:er -~ ~l=ato~ \
`!, · ~;' ..... ~ j_
`~:=___j
`
`•;:
`
`)
`
`257
`
`. r
`
`'
`
`Investigator
`
`)
`
`Outside
`
`f
`
`il'llancer
`
`i
`
`i
`
`j
`
`j
`
`[
`
`~0~:~~--l \--\ "-/7_-/ ~ 1 J252~--~5~ . ..:::..~-1r-B-1 .......... ;l
`
`20~1' 102 tt Router \~ . \
`------- -----'/
`204
`\
`'-----~
`
`:
`
`.............
`
`/
`
`\
`
`r--·
`
`\
`
`200 1
`!
`
`•••
`
`I .
`
`.
`
`256
`
`-
`
`i 257
`L__
`
`!
`'
`
`!
`
`L
`i Oatabasj
`258
`----
`
`.. ---- . .
`
`""-
`
`i r Slnart load '; t!alic!!S~~ng i I Application
`Balance< I f'roC!!s.n<tg I
`I
`\
`~-
`\
`I
`';.~~-y ~ _}?L, 255
`~-....
`~
`) l
`.....
`·
`!
`:j)
`--------------~
`·1
`I
`290 ~/ l
`f2s3
`i r ,.., ~ .. ,, , "~..... , """'"'" , I ,. .... ~ ,
`Cluster C
`J_J" r----......, t~, r=::'l
`'L 1
`~ \
`l j
`j
`i
`VOlP-to-POT
`257 J
`\ ~ 255
`I i
`i
`\
`Provider
`, 256
`)
`260
`:
`: L ____ ::..::.__j
`-------------
`-' -----------------
`\\ l
`;
`¢ ---------
`TELCO Provide
`(POTS providers)
`~~10 ~ J, 1 254
`' \ ~------~ (..--------~
`·
`( 5m~rt loac:l '! Rll!l<:&sslng
`l
`~~ !
`~.
`i l Procasslng
`
`(
`Kiosks
`R~uter 'r---~
`102
`"~ ;7}
`____ =:::.::.;
`~~ FacHitv D
`i
`------~
`'
`.....
`_...
`i
`,
`//
`~ fK
`· __ j I
`20 L .... ~~ Router f
`__ ________;
`I ~ j
`.
`-------
`lOO L~~~;·j m : ~ 25~ ~ 256 ____ ~=:::~~=-~~~~=- __ x
`!
`----------~~ I
`M r·
`
`--..
`
`t.04 ______ ___\
`
`l<losks
`
`: '
`
`\
`
`/
`
`204
`
`1
`
`!
`
`Facility E
`!
`
`71
`
`r
`
`\
`
`\1.
`
`Balancer
`
`A\
`
`1
`
`Bal;sncer
`
`[-----
`
`~ ................ -... .. . ... ~- ... ·-- ·-·~···
`
`.
`
`figure 4
`
`j
`258 __ __j
`-------·
`
`-----------------
`
`Cluste~ 0
`(...---- \
`App:Jc..tlon 1 j
`!
`
`.
`'
`
`·
`
`I
`
`I
`
`( o~tabase "-
`i ll J i
`
`(')
`
`~ .....
`
`'"= ~ .....
`('D = .....
`~ 'e -....
`.... 0 =
`~
`0" =
`.... 0 =
`
`(')
`
`~ .....
`
`(')
`
`0
`.....
`~(H
`N
`
`0 ....
`
`(H
`
`('D
`('D
`
`rFJ =(cid:173)
`.....
`N
`0 .....
`N
`0
`
`c
`rFJ
`N
`0 ....
`(H ---0
`
`N
`0\
`(H
`N
`N
`-....l
`
`> ....
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 3 of 20
`
`US 2013/0263227 A1
`
`)0 \
`
`J_,,tre 3
`
`v
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 4 of 20
`
`US 2013/0263227 Al
`
`(L(()O
`
`ROM
`
`!itD
`
`CPU
`
`Tbvv~
`5G,f'e1n-
`41~ .fn+ut4CC.
`
`H~A
`'1l'f Ptsk
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 5 of 20
`
`US 2013/0263227 Al
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 6 of 20
`
`US 2013/0263227 Al
`
`This sf:3tls.)rt is re.seroed fuc
`
`v $e.r A
`
`fro:'n
`;!fJ(lpm-3:00pm
`
`Pod 8 At:tMty
`
`>3-:lSpm~New~JM~f"t~n;S:nl>:h
`>3:1~..m·~Newm~~~~S>!-frnl(p_n.J~~~
`:;. 3:'l3prr:" Jt,'2 i'2:0:pot'~~XJr·~~,QI !<>Mrel'\
`>l-1~-~~k..;-Wl\f~):\)1
`)o)JJ~'"'ln.::o.~i'l2';!:lf'ilfJ~"t~
`> ~:00 prn~k~~:!'lg ~:Vtlb"W.R~ohmoo
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 7 of 20
`
`US 2013/0263227 Al
`
`;~~;;;;:::~~ [g]+.. 705
`
`':>l:lSr.m~l<lb!!~f~IMIJd:omt
`::.J~1<Jpm•l'k'lli~.1:UrY8l!k!lv"Mn
`:-3:\Np~·,l~ad:focJo.'mSmrth
`;... ;1:08pM ·inwrnll'lgta8b 'MR Johr.s¢
`
`tog:n
`
`~====~~~~~-~-~
`
`RePe;.rt: Prompt
`
`Help
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 8 of 20
`
`US 2013/0263227 Al
`
`Welcome Ken Jones
`
`IDCheck:
`
`lift handset and speak your voice verification phrase •.
`
`. L......
`
`login>
`
`Login wm be cancell~d in 15 seconds.
`
`Help
`
`··1
`
`E<pai\ol
`
`'
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 9 of 20
`
`US 2013/0263227 Al
`
`Welcome Ken Jones
`
`IDCheck:
`
`Please tine up your
`eyes with the marks
`and remain still.
`
`Login will be cancelled in 15 seconds,
`
`c······
`
`Verify>
`
`e Volume
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 10 of 20
`
`US 2013/0263227 A1
`
`_ . ..,..__...... ........... -.... ..,. ... ___
`
`--""- ~~ T-l'h<mO~.i"'~
`
`.lbOI
`
`.U.C.l
`
`filiJO)
`
`.ICO"'
`
`J lOll
`---------.
`frl~1u!fl1 3:1~ I
`.1¢05
`
`Phone
`
`.'Se<ured
`!fitemet
`
`.IOC' .. 1007
`
`t. ... <il t.:~--<t.d
`
`iele-M<!dica!
`
`·M~~!l9
`
`wort •
`
`<l>'d<rCtlln~ry
`
`VIJ.eo
`
`• lbO<f
`
`£J!I.u.-ks:-...
`
`~~t;~t.rJS
`~ .... , "'e}
`
`l()j () ••
`
`fleamJ;,l(i~
`
`~-----.-~-----:.:;;:::------_:::----.:::--:;,;,;····~
`
`: :
`
`logout
`
`Volume
`
`:
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 11 of 20
`
`US 2013/0263227 Al
`
`Yoo how 3U =><~; <:» 'l'l>ke ~call.
`Oiil!Now
`
`1101
`
`rQ.~~s;k_~\!!;S
`
`Customor .Sen<ite
`PREA
`~PREll l!>ddent
`
`411
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 12 of 20
`
`US 2013/0263227 A1
`
`r::l Volcemail
`L.:=::J
`.
`c······~.-.-~· ...........
`I > l~~
`II
`
`AUf' II
`
`4l!Y10@3:12pm
`
`4/12/11) @ 3:00pm
`
`I
`
`(.SOS) 111-1234
`
`\626) 555·1212
`
`/
`
`Jll~o:h· c,,
`1 "-:'.~Tk J.
`Indiana Janes
`
`,;'ley!.<'!
`
`v !
`·~
`
`lUJ't
`
`!<OI'»/<1$<
`
`llol'»/<!.<1<
`
`NO!'io><Wt
`
`Nol'l!l}~tdt
`
`Nof'!;oy>l.otl:
`
`41101Hl@ 1:00pm
`
`(714)123-2341
`
`418/iO@ tl:12am
`l 4/5/l()@ 7:il2am
`l
`l 3/12/IC@ 8:01am
`
`(815) 135-.5613
`
`JemwJones
`
`121?.1135-1356
`
`(6.~0) 133-- !)51
`
`<ll~r
`
`:Vl:l/1G@1:21pm
`
`(800) 135·l:!S1
`
`Don Draper
`
`\
`
`N<l~4Cf.'l~
`
`c:._ .......
`
`:UQ/113@6:0~
`
`(866)121-1}~?._.
`
`vOOWNv
`
`==:J
`
`Mom
`
`..
`
`c.:lll><:<
`
`/'
`~·-~~--~
`'X i
`~!b:~ :X!
`~
`;!
`c.;t&><:k X
`--------'"-
`.:.Hi!¥.k X
`-
`Odl!bt<t X
`{A!;~ X
`c&l~ X
`
`$
`
`$
`
`$
`
`$
`
`$
`
`-----
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 13 of 20
`
`US 2013/0263227 Al
`
`---------··------····---······------
`r=l Bail Bond Companies
`Bail Bond Companies are displayed
`L~
`In random order,
`
`T-»<ii?>ni>l
`AAA !!u:lds United
`~~0~
`Ooul:>!e A Sa!! !lond< .
`.. ~~
`~~lt'oV"~
`~~!_~f!1S
`-
`.. l:olol
`FilS! Bali Bond>
`l'ootlltot»sl
`(;niden !i~ Sr.!i Sond!i
`'r:::K!U.t~~
`Ja!l l'londs Plus
`i<>l<htoORI
`ll~t!l=:!s .........
`~:0'~
`S:>rur•ll Free ll3ll Bonds
`
`!
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 14 of 20
`
`US 2013/0263227 A1
`
`f 1'101
`
`Chatles Jones
`
`Hang Up
`
`Save Snapshot
`($0.25)
`
`AI~~:..,Jv.t~2R ~-.. st:~e!.t turea::-td"c!l~N".O
`morOtcoil\l; ~~tfvf
`ptMidg~ t:')M:m:!"[<:~tlo."\s~~:t ;m
`.;c~:iJ>.4di~t.
`
`l
`e - -
`
`Logvut
`
`My.'I<CWSlt
`
`Main Menu
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 15 of 20
`
`US 2013/0263227 A1
`
`r---1 Recording
`I <<!
`
`L_ j
`
`1:30 remaining
`
`Stop Recording & Save
`
`...
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 16 of 20
`
`US 2013/0263227 A1
`
`l«<,joNo¥"i.
`
`"H"1lv~ R~l(:>l'V~d Oitt -~Ulpm
`
`r'f'~~Jul>'3! s::stm
`
`.. J
`
`-::~=~ r;
`~~~#~ .. ~
`Q.,m~ .. l
`
`. ._,.,.,.
`< BKttes
`I
`··::-iott-4 lr-;.;,;~
`2 PlAYs Left i
`II KM-.."J ! lG!<Ilw>d<d
`
`AUf' I\
`.......... ,. ....
`4/12n Q @>3:12pm
`
`"'
`
`1 Plavleft
`Kltt'~~
`Nof'lavs
`l<m-~
`Nul'!ays
`t:!t<~:og
`No PI~\.,.
`~~''t9
`No PI;,"'>
`IO!»F.~.g
`No Plays
`IGI<!?-'<lfo!!
`No !'lays
`
`411 '211 0@ 3:00l3m
`IO«Ro<«<bo!
`4,tl(l/10!j;3~
`-~---
`lGWR••••:!d
`4/S/H.l® 11:1 2am
`
`...,-.~
`
`4/SflO ii!7:()lam
`;()<&~
`3!1l/10e M2am
`I<!!•~
`3{12/1 0@ ~:.4JB.!!!.
`Kit>o!lo<o:dtd
`2/6!1 0 @ 6:00um
`
`IGI<!~
`!'I <me
`Kk<R«pooS<
`N~·-··········----·-
`lilt•~
`4/1011 c ~ 2:()\lpm
`l<if•~
`4/8/lO@ 11:12-clm
`KJt.l!>""""'"'
`4/6/10 llJ>7:\fl~--
`i p_m~:
`IO!•~()i$ll:C2Qm
`l~.a~
`IC<•R.,..,.
`3/12/10@7:2:'1l j~~~-·
`i<lt<=~6:00
`
`l!ol<dftoop-
`
`~R~»e
`........ .,.,.
`
`r
`
`..
`
`vDOWNv
`
`IG
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 17 of 20
`
`US 2013/0263227 A1
`
`J 110\
`
`MuhMd Gm"J<J!ii"!l Edut.>tloo (265)
`emwsebyReglont1~l
`
`llr-Bv_Cal_wr_«_or_Gr®P __ (2_®_l - - - - - - - - · 0 fdu!'<llnr.com-www.edll!'<llnt.a>m
`
`BySISbjt'rtl!l(!$)
`!'----------··-···················
`!1 ~t.<oami~~g{180l
`I! Hlgb<!rEl:!Ueati®(l717nl
`1:
`· i K·12 (5111 Sl
`
`10 011~. v~.<ci~com
`10 ApolloGroop·W>'JWJtpol!~u
`0 ~USII£om·v.-;:!;ss.'l5usa.<nr~
`0 ~C:">nsultln;i·~wm
`0 Cl'E~Siomolcduc;Jiiun SeMca>i·WW'k~'P'<S.::pe.com
`0 AdllirS"(l:d<mC.!mte;Th~·www.3<fu!ISI!Kientc<mer.mm
`0 Koo-Yi • WIOIW.kn<:M.tool
`•
`0 M<>owca-Eduf.11tkm~urc<3S·
`rOSQUrres.moosta".<Omlooucotion
`
`I Save ched<ro as Bookmarks _J
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 18 of 20
`
`US 2013/0263227 A1
`
`!:Mall Friends
`
`Telmate will send a message to your
`Friends who have deposited funds for
`you befot'e.
`
`Tap the names you wish to notify.
`
`!fo nome ;mt~bk>. II':> b<tau.e til<> part)! dld not
`giWU> i>elm!SSIOO t<l ron= tmtn, ~tyou haoe ;;lt~ad>J
`~t..!f>J«<lsfromm.m
`
`---------····---
`Toorlito~
`Jack!>' Jones
`
`Send Email
`
`Cancel
`
`:1
`l
`
`f....,.idlti'J~ii
`Smlth~n
`foodttzy'Emal.!
`,_ Mithacl Michaels
`
`L..
`
`vOOWlh
`
`.•..... ]
`
`e logwt
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 19 of 20
`
`US 2013/0263227 A1
`
`co
`
`c:;",
`,.........,
`
`u
`
`~
`~
`
`<
`
`0\
`,.........,
`0
`~
`~
`
`7
`0 c-..
`
`.D
`(',1
`0
`0\
`"""'
`
`01 0
`(J\ -
`
`
`
`Patent Application Publication
`
`Oct. 3, 2013 Sheet 20 of 20
`
`US 2013/0263227 Al
`
`...
`
`...
`
`.xm
`...... 0
`0
`(1J
`:S:'t::
`.....,
`ID
`(!)....,
`Z.,S
`
`J
`
`*"'(!)(!)
`:J 0
`0
`
`:J (!)
`
`(!)
`
`:_./" .& ·:;; .g
`ooc:
`-
`
`<0
`0
`0
`N
`
`.. ..
`
`..
`
`..
`
`~
`
`..
`
`0
`
`N .
`C)
`......
`u..
`
`....
`"'<T
`0
`N
`
`..... <D8 J
`.. O..>'t::
`::lg (1J
`c
`ru m
`-oc:
`
`......
`0
`(/)
`(/')
`(!)
`0
`0 ,_
`Q_
`
`::2:
`0
`0:::
`
`...
`
`..
`
`N .,...
`0
`N
`
`J
`
`J
`
`E c
`(!) 0
`t:i E
`>,(!)
`<fJ~
`
`J
`
`'<:!'
`0
`0
`N
`
`\
`
`N
`0
`0
`N
`
`Jl
`\;
`
`C>
`o:>
`ro ,_
`0 _.
`(f)
`
`\
`
`j
`
`...
`
`..
`
`..
`~J
`0
`
`0 g
`
`N
`
`
`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`1
`
`SECURE COMMUNICATION SYSTEMS AND
`METHODS
`
`CROSS-REFERENCES TO RELATED
`APPLICATIONS
`
`[0001] This application is a continuation-in-part applica(cid:173)
`tion of U.S. patent application Ser. No. 13/088,883, titled,
`"Interactive Audio/Video System and Device for Use in a
`Secure Facility," filed on Apr. 18, 2011, which is hereby
`incorporated by reference in its entirety for all purposes.
`
`FIELD
`
`[0002] The subject technology generally relates to commu(cid:173)
`nications, and more particularly to the use of secure commu(cid:173)
`nication systems to provide communications.
`
`BACKGROUND
`
`[0003] Detention environments, such as jails, prisons,
`detention facilities, secured hospitals, or addiction treatment
`facilities, may house large populations of individuals in con(cid:173)
`finement, which presents unique administrative challenges.
`In such detention environments, detained individuals may
`frequently desire to communicate with individuals outside
`the detention environment (outside parties) such as friends or
`family members. A variety of methods may be used to support
`such communications, including in-person visits (e.g., in
`which both a detained individual and a visitor may be in the
`same room, such as in lower security facilities or for low-risk
`detainees) or in a special visitation room (e.g., where the
`parties are separated by thick glass or plastic, and may com(cid:173)
`municate via wired telephone equipment on both sides of the
`partition). The costs and security measures associated with
`these methods of communication can be significant for both
`the facilities and the visitors.
`
`SUMMARY
`
`[0004] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method is provided for deter(cid:173)
`mining whether a communication session is authorized. The
`method includes initiating a communication session between
`a first user and a second user, and obtaining an identity
`attribute associated with a third user engaged in the commu(cid:173)
`nication session. The method also includes determining
`whether the third user is the first user, the second user, or an
`unauthorized user based on the obtained identity attribute.
`The method also includes determining whether the commu(cid:173)
`nication session is authorized based on whether the third user
`is determined to be the first user, the second user, or the
`unauthorized user.
`[0005] According to various aspects of the subject technol(cid:173)
`ogy, an apparatus comprising memory and a processor is
`provided. The memory includes instructions for determining
`whether a communication session between a first user and a
`second user is authorized. The processor is configured to
`execute the instructions to: initiate the communication ses(cid:173)
`sion; obtain an identity attribute associated with a third user
`engaged in the communication session; determine whether
`the third user is the first user, the second user, or an unautho(cid:173)
`rized user based on the obtained identity attribute; and deter(cid:173)
`mine whether the communication session is authorized based
`on whether the third user is determined to be the first user, the
`second user, or the unauthorized user.
`
`[0006] According to various aspects of the subject technol(cid:173)
`ogy, a machine-readable medium comprising instructions for
`a method of determining whether a communication session is
`authorized is provided. The method includes initiating a com(cid:173)
`munication session between a first user and a second user, and
`obtaining an identity attribute associated with a third user
`engaged in the communication session. The method also
`includes determining whether the third user is the first user,
`the second user, or an unauthorized user based on the obtained
`identity attribute. The method also includes determining
`whether the communication session is authorized based on
`whether the third user is determined to be the first user, the
`second user, or the unauthorized user.
`[0007] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for determining iden(cid:173)
`tity attribute variations of a user is provided. The method
`includes obtaining an identity attribute of a first user and
`comparing the identity attribute of the first user to a stored
`identity attribute of an authorized user who is authorized to
`engage in a communication session. The method also
`includes determining that the first user is authorized to engage
`in the communication session if the identity attribute of the
`first user matches the identity attribute of the authorized user.
`If the identity attribute of the first user does not match the
`identity attribute of the authorized user, the method also
`includes: flagging the identity attribute of the first user for
`review by an investigator; receiving verification from the
`investigator that the flagged identity attribute of the first user
`is or is not a variant of the identity attribute of the authorized
`user; and determining that the identity attribute of the first
`user is the variant of the identity attribute of the authorized
`user if the verification indicates that the flagged identity
`attribute of the first user is the variant.
`[0008] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for identifYing users is
`provided. The method includes obtaining an identity attribute
`of a first user. The identity attribute of the first user includes a
`first behavior. The method also includes comparing the iden(cid:173)
`tity attribute of the first user to a stored identity attribute of a
`second user. The identity attribute of the second user includes
`a second behavior. The method also includes determining
`whether the first user is the second user based on the com(cid:173)
`parison.
`[0009] According to various aspects of the subject technol(cid:173)
`ogy, a computer-implemented method for enhancing facial
`recognition accuracy is provided. The method includes initi(cid:173)
`ating, by a first device comprising a camera, an interactive
`session with a first user. The method also includes surrepti(cid:173)
`tiously directing the first user to engage in one or more activi(cid:173)
`ties in front of the camera such that the first user is positioned
`at a plurality of different angles relative to the camera. The
`method also includes capturing, with the camera, a plurality
`of images of the first user when the first user is positioned at
`the plurality of different angles. The method also comprises
`using the plurality of images to perform facial recognition of
`the first user.
`[0010] Additional features and advantages of the subject
`technology will be set forth in the description below, and in
`part will be apparent from the description, or may be learned
`by practice of the subject technology. The advantages of the
`subject technology will be realized and attained by the struc(cid:173)
`ture particularly pointed out in the written description and
`claims hereof as well as the appended drawings.
`
`
`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`2
`
`[0011]
`It is to be understood that both the foregoing general
`description and the following detailed description are exem(cid:173)
`plary and explanatory and are intended to provide further
`explanation of the invention as claimed.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`[0012] The accompanying drawings, which are included to
`provide further understanding of the subject technology and
`are incorporated in and constitute a part of this specification,
`illustrate aspects of the subject technology and together with
`the description serve to explain the principles of the subject
`technology.
`[0013] FIG. 1 illustrates an embodiment of the interactive
`audio/video platform.
`[0014] FIG. 2 illustrates the organization and interaction of
`clusters of another embodiment of the interactive audio/video
`platform.
`[0015] FIG. 3 illustrates an example kiosk for use in the
`interactive audio/video platform.
`[0016] FIG. 4 illustrates an example processor-based com(cid:173)
`puter system of the kiosk.
`[0017] FIG. 5 illustrates an example idle screen of a kiosk
`interface described herein.
`[0018] FIG. 6 illustrates an example reservation screen of
`the kiosk interface.
`[0019] FIG. 7 illustrates an example login screen of the
`kiosk interface.
`[0020] FIG. 8 illustrates an example voice verification
`screen of the kiosk interface.
`[ 0021] FIG. 9 illustrates an example facial recognition veri(cid:173)
`fication screen of the kiosk interface.
`[0022] FIG. 10 illustrates an example main screen of the
`kiosk interface.
`[0023] FIG. 11 illustrates an example phone screen of the
`kiosk interface.
`[0024] FIG. 12 illustrates an example voicemail screen of
`the kiosk interface.
`[0025] FIG. 13 illustrates an example bail bonds screen of
`the kiosk interface.
`[0026] FIG. 14 illustrates an example video conferencing
`screen of the kiosk interface.
`[0027] FIG. 15 illustrates an example video messaging
`screen of the kiosk interface.
`[0028] FIG. 16 illustrates an example kite screen of the
`kiosk interface.
`[0029] FIG.17 illustrates an example internet screen of the
`kiosk interface.
`[0030] FIG. 18 illustrates an example fund request screen
`of the kiosk interface.
`[0031] FIGS. 19A and 19B illustrate an example audio that
`may be displayed.
`[0032] FIG. 20 conceptually illustrates an electronic sys(cid:173)
`tem with which implementations of the subject technology
`may be implemented.
`
`DETAILED DESCRIPTION
`
`[0033]
`In the following detailed description, numerous spe(cid:173)
`cific details are set forth to provide a full understanding of the
`subject technology. It will be apparent, however, that the
`subject technology may be practiced without some of these
`specific details. In other instances, structures and techniques
`have not been shown in detail so as not to obscure the subject
`technology.
`
`[0034] Detention environments often have telephone sys(cid:173)
`tems installed specifically for use by inmates. These systems,
`commonly known as Inmate Telephone Systems, allow
`detainees to call individuals residing outside secure facilities,
`and such calls may be limited to pre-authorized and identity(cid:173)
`verified individuals, or may be fairly unrestricted, limited
`only by a facility-maintained "prohibited contact list," or
`anything in between. One such system is described in U.S.
`Patent Application Publication No. 2011/0317820 A1: Cen(cid:173)
`tral Call Platform, which is incorporated by reference herein.
`[0035] A detention environment may also have one or more
`video visitation systems installed, wherein specialized vid(cid:173)
`eoconferencing systems are used to allow friends and family
`members to visit with incarcerated individuals from the lobby
`of the detention environment (e.g., on-site video visitation),
`the lobby of another detention environment with a suitable
`service, or even a computer (e.g., desktop or mobile com(cid:173)
`puter) suitably equipped with a web camera and video con(cid:173)
`ferencing or web browser software. This latter method is
`commonly called "remote video visitation," and if one or
`more endpoints are handheld computing devices, the method
`is commonly called "mobile video visitation." Examples of
`these systems are described in U.S. Patent Application Pub(cid:173)
`lication No. 2012/0262271 Al: InteractiveAudioNideo Sys(cid:173)
`tem and Device for Use in a Secure Facility, which is incor(cid:173)
`porated by reference herein.
`[0036] One endpoint in these video visitations takes place
`inside secure facilities in or near the inmates' cells. Custom
`network computing terminals, such as video visitation kiosks,
`installed inside these secure facilities for such purposes can
`be hardened against physical and electronic attempts to cir(cid:173)
`cnmvent their being used contrary to the facilities' rules, as
`these are generally owned and operated exclusively by a
`single company at any particular facility, which has an exclu(cid:173)
`sive contract to provide such equipment and services to that
`facility.
`[0037] Secure facilities may require additional levels of
`monitoring and oversight that are not required when similar
`services are provided to otherpopulations.Although two-way
`video conferencing is now quite common on desktop and
`laptop computers suitably equipped with appropriate hard(cid:173)
`ware and software, and is now becoming available on com(cid:173)
`monly available computing tablets and smartphones with
`wireless Internet connections, the increased transportability
`and concomitant increased usage and propensity to share use
`of a device with multiple people increases security concerns
`related to allowing such video visitations for inmates.
`[0038] The above-described system may be used to interact
`with a Secure Social Network (SSN), as described in U.S.
`patent application Publication Ser. No. 13/438,940, which is
`incorporated by reference herein. In some aspects, the SSN
`provides a method for facilitating the exchange or transmis(cid:173)
`sion of information between members of a social network in
`which at least one member is subject to limitations of a
`controlled facility, including the steps of: receiving content in
`an electronic form from a member for display to members or
`intended members of the social network; evaluating the
`received content to determine if it is appropriate for display to
`the members or intended members of the social network;
`allowing the received content to be viewed by the members or
`intended members of the social network only if it is deemed
`appropriate for display in the evaluating step; and recording
`data relative to one or more of the receiving, evaluating, and
`allowing steps.
`
`
`
`US 2013/0263227 AI
`
`Oct. 3, 2013
`
`3
`
`[0039] According to certain aspects, the SSN provides a
`system for facilitating the exchange or transmission of infor(cid:173)
`mation between members of a social network in which at least
`one member is subject to limitations of a controlled facility,
`including: a data receiving module configured to receive con(cid:173)
`tent in an electronic form from a user for display to members
`or intended members of the social network; an evaluation
`module configured to evaluate the received content and deter(cid:173)
`mine if it is appropriate for display to the members or
`intended members of the social network; a content dissemi(cid:173)
`nation module configured to provide received content that is
`deemed appropriate by the evaluation module to the members
`or intended members of the social network for viewing; and a
`data recording module configured to record data relative to
`the actions of one or more of the data receiving module, the
`evaluation module, and the content dissemination module.
`[0040] Some or all of the foregoing mentioned systems
`may generally seek specific authorization and individual
`authentication prior to each use to ensure that only inmates
`with telecommunications privileges are allowed to commu(cid:173)
`nicate, and that they are only able to communicate with indi(cid:173)
`viduals residing outside the facility and whom the inmate is
`allowed to communicate with. For instance, inmates are gen(cid:173)
`erally prohibited from communicating with judges, jurors,
`witnesses, victims, and others involved in their charges or
`convictions, as well as known felons and gang members.
`[0041] Aspects of the subject technology include the con(cid:173)
`tinuous, real-time or near-real-time use of biometrics to
`ensure that only persons authenticated and authorized as
`described above may use these telephone, video visitation,
`SSN, and/or other communication systems. In some aspects,
`secure facility operators may elect to allow all or substantially
`all communications activity to take place, save for blocking
`communications among individuals prohibited from commu(cid:173)
`nicating with each other, for the purpose of intelligence gath(cid:173)
`ering activities, which may both aid the security of the facility
`and provide law-enforcement officials with a rich source of
`information relating to criminal activities. The decision of
`which of these two methods to use may be implemented on a
`per-facility, per-wing, per-group, or per-inmate basis, at the
`discretion of the facility administrators and investigators.
`[0042] For instance, allowing communications containing
`persons who might be in a category prohibited from commu(cid:173)
`nicating with any inmate or the particular one involved in the
`communication in question, at least for one to several occur(cid:173)
`rences, may also allow for the recording, archiving, and
`analysis of small-to-large amounts of audio and video
`streams and other activity by inmates using these communi(cid:173)
`cations terminals. Commonly called "data mining," this often
`large-scale analysis of data and patterns therein can uncover
`links between and among individual users of the system that
`may otherwise have gone undetected by facility administra(cid:173)
`tors and law-enforcement officials.
`[0043] According to various aspects of the subject technol(cid:173)
`ogy, voice comparison techniques (e.g., using commercial
`off-the-shelf voice comparison software and/or other suitable
`software) may be used in novel ways to perform voice recog(cid:173)
`nition on persons using telephone and/or video communica(cid:173)
`tions related to secure facilities, such as in the case of inmate
`telephone and visitation systems, to ensure only authorized
`individuals communicate. In some aspects, facial recognition
`techniques may be used to limit and authenticate access to
`devices used by inmates to communicate with outsiders, and
`to limit and authenticate access to software and terminals
`
`capable of interacting with the devices to only individuals
`authorized to communicate with any particular inmate. In
`some aspects, tools are provided to otherwise analyze above(cid:173)
`mentioned images and/or videos on a broader basis, thereby
`allowing a catalog of all individuals and/or objects recog(cid:173)
`nized in all images and videos uploaded to the system to be
`built, regardless of which facility or individual they are
`intended for, for the purpose of creating an investigative tool.
`[0044] Voice and/or facial biometrics may be used to
`authenticate users, to identifY other persons involved in com(cid:173)
`munications sessions, and to sleuth out previously unknown
`links among users of the system. A biometrics system may be
`used to identify individuals. The system may use these bio(cid:173)
`metric profiles to identify individuals appearing in any and all
`content passing through or otherwise available to the system.
`Other software may then search for connections (e.g., using
`six-degrees-of-separation principles) to find possible links
`among inmates and their contacts.
`[0045] According to various aspects of the subject technol(cid:173)
`ogy, voiceprint matching (e.g., using continuous voice bio(cid:173)
`metrics) may be used as an additional verification step when
`inmates log into an inmate communication system (e.g.,
`Inmate Telephone System). In some aspects, the same capa(cid:173)
`bility may be used to detect when one inmate logs in using his
`personal identification number (PIN) and voice, then hands
`the telephone to another inmate. This practice may be com(cid:173)
`monly the result of fraud (e.g., a first inmate offering use of
`his login for a second inmate to avoid restrictions on whom
`the latter can call, or even an outright prohibition on making
`any calls), and also intimidation (e.g., a third inmate f