`Torgersrud et al.
`
`(io) Patent No.:
`(45) Date of Patent:
`
`US 8,917,848 B2
`Dec. 23, 2014
`
`US008917848B2
`
`(54) CALL MANAGEMENT FOR SECURE
`FACILITIES
`
`(71) Applicant: Telmate LLC, San Francisco, CA (US)
`
`(72)
`
`Inventors: Richard Torgersrud, San Francisco, CA
`(US); Christopher Ditto, San Jose, CA
`(US); Morgan Collins, San Mateo, CA
`(US)
`
`(73) Assignee: Telmate, LLC, San Francisco, CA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl.No.: 13/843,461
`
`(22) Filed:
`
`Mar. 15, 2013
`
`(65)
`
`Prior Publication Data
`US 2014/0270126 A1
`Sep. 18, 2014
`
`(51)
`
`(2006.01)
`(2006.01)
`
`Int.Cl.
`H04M3/42
`H04M3/38
`(52) U.S. Cl.
`CPC ...................................... H 04M 3/382 (2013.01)
`USPC ............... 379/202.01; 379/142.05; 379/88.02
`(58) Field of Classification Search
`USPC .............................. 379/202.01,88.02,142.05
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,768,355 A
`5,769,811 A
`
`6/1998 Salibrici et al.
`6/1998 Stacey et al.
`
`9/1998 McFarlen
`5,805,685 A
`7/2004 Blink
`6,763,099 B1
`8,135,127 B2 * 3/2012 K itchinetal..................... 379/350
`8,648,894 B2 * 2/2014 Laneyetal.................... 348/14.03
`2007/0071206 Al * 3/2007 Gainsboro et al............... 379/168
`8/2011 Hodge ............................ 370/352
`2011/0206038 Al *
`OTHER PUBLICATIONS
`
`Mazurczyk, W. and Kotulski Z.,“New VoIP Traffic Security Scheme
`with Digital Watermarking”; Warsaw University of Technology;
`Warszawa, Poland; 2006 (12 pages).
`http://web.archive.org/web/
`“Lattice
`Incorporated”;
`20120121002059/http://latticeinc.com/product; Accessed on Mar.
`10, 2014 (3 pages).
`Dabrowski, A et al.; “Real-time watermarking of one side of tele
`phone conversation for speaker segmentation”; Poznan University of
`Technology; Jun. 2012 (6 pages).
`Kirovski, D and Malvar, H.; “Spread-Spectrum Watermarking of
`Audio Signals”; Fellow, IEEE Transactions on Signal Processing,
`vol. 51, No. 4, Apr. 2003 (14 pages).
`Wang, X., Chen, S. and Jajodia S.; “Tracking Anonymous Peer-to-
`PeerVoIP Calls on the Internet”; Alexandria, VA Nov. 7-11,2005 (11
`pages).
`
`* cited by examiner
`
`Primary Examiner — Quynh Nguyen
`(74) Attorney, Agent, or Firm — Osha Liang LLP
`
`ABSTRACT
`(57)
`A method for controlling a call in a first controlled facility
`includes connecting an inmate in the first controlled facility to
`the call when each party of the call is verified, testing incom
`ing audio on the call to detect a controlled facility tone from
`a second controlled facility, and transmitting a notification of
`a violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`
`19 Claims, 11 Drawing Sheets
`
`GTL 1007
`PGR of U.S. Pat. No. 8,929,525
`
`0001
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 1 of 11
`
`US 8,917,848 B2
`
`
`
`hmaow.282
`
`fl
`
`.miownm>>
`
`fl
`
`aLoEooSmo
`
`a{0262
`
`$9330
`
`a83mmmczquoo
`
`$9330
`
`aco_#mo__qq<
`
`FGE
`
`BwEE
`
`mESanO
`
`%83mm
`
`>th95
`
`§28381
`
`
`
` a526$8:938
`
`a30:1EmEE
`
`acosmo=qq<
`
`LESBEEE wcozmoEsEEoo
`
`
`
` a350m“.@2330
`
`co_“mo__aa<
`
`aEimm
`
`agmaom$838
`
`0002
`
`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 1 of 11
`
`US 8,917,848 B2
`
`FIG. 1
`
`0002
`
`
`
`
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 2 of 11
`
`US 8,917,848 B2
`
`ongE
`
`%83mmmESQEoo
`
`BmEE
`
`%cozmo__aa<
`
`mcozmoEsEEoo
`
`%x5262
`
`N.OE
`
`%83mmmESQEoo
`
`LoambEEEU/x
`
`x82Lo:w_> ac2323.”?
`aafig98:;SEE:x82mHmEExmoimczoom
`
`
`
`333mm:83
`
`0003
`
`LogmwaEU/x%
`
`
`
`526$36:80
`
`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 2 of 11
`
`US 8,917,848 B2
`
`FIG. 2
`
`0003
`
`
`
`
`
`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 3 of 11
`
`US 8,917,848 B2
`
`FIG. 3
`
`Application
`Investigator
`
`314
`
`Application
`Reviewer
`
`312
`
`Computing Device
`
`308
`
`Investigator
`
`I
`
`Computing Device
`
`Reviewer
`
`306
`
`Application Server
`
`302 iL Database Server
`
`304
`
`Outside Facility
`
`300
`
`0004
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 4 of 11
`
`US 8,917,848 B2
`
`Computing
`System
`400
`
`FIG. 4
`
`0005
`
`
`
`US. Patent
`
`Dec. 23, 2014
`
`Sheet 5 of 11
`
`US 8,917,848 B2
`
`Video Visitation Kiosk
`500
`
`
`
`
`FIG. 5A
`
`0006
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 5 of 11
`
`US 8,917,848 B2
`
`0006
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 6 of 11
`
`US 8,917,848 B2
`
`Video Visitation Kiosk
`500
`
`FIG. 5B
`
`0007
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 7 of 11
`
`US 8,917,848 B2
`
`Mobile Computing
`Device
`600
`
`FIG. 6
`
`0008
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 8 of 11
`
`US 8,917,848 B2
`
`Network Application
`700
`Party Verification
`Module
`704
`
`Call Analysis
`Module
`706
`
`Connection Module
`708
`
`Datacenter Server
`702
`Inmate Account
`712
`Telephone
`Network List
`720
`Incarceration
`Information
`722
`
`Saved
`Communications
`716
`
`User Interface
`710
`
`Party Voiceprint Data
`718
`
`FIG. 7
`
`0009
`
`
`
`US. Patent
`
`Dec. 23, 2014
`
`Sheet 9 of 11
`
`US 8,917,848 B2
`
` Step 801
`
`Establish a two-way call between inmate and another party
`
`Step 803
`Receive
`
`call? NO
`request to add a party to the
`
`
`END
`
`
`Step 805
`Use
`
`inmate's telephone
`
`NO
`
`Step 811
`
`Present inmate telephone network
`list to inmate
`
`Receive new number from inmate
`
`network list?
`
`
`
`
`
`
`Step 809
`
`Step 813
`
`Identify owner of number
`
`Step 817
`
`Step 815
`
`YES
`
`ls number authorized?
`
`Step 819
`
`
`
`Receive selection of a contact from
`
`the inmate telephone network list
`
`Contact new party for call
`
`Inform new party of connection to
`controlled facility
`
`
`
`
`
`
`”0
`
`FIG. 8
`
`NO
`
`New party accepts?
`
`Step 821
`
`YES
`
`NO
`Step 823
`
` ls
`party that answered
`
`authorized?
`
`Connect new party to existing call
`
` Y
`
`Step 823
`
`ES
`
`0010
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 9 of 11
`
`US 8,917,848 B2
`
`0010
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 10 of 11
`
`US 8,917,848 B2
`
`( START )
`______j______
`Receive, from an inmate, a
`request for a multi-party call
`
`/- Step 901
`
`f Step 903
`Receive a party identifier for each
`party to the call
`f- Step 905
`Verify that the inmate is authorized
`to communicate with each party to
`obtain verified parties
`r Step 907
`
`Attempt to connect to verified
`parties
`_______ i_______
`Inform inmate of status of
`connecting parties to the call
`
`/- Step 909r
`
`( START )
`
`f Step 1001
`Receive, from an inmate, a
`request for a multi-party call
`
`Generate conference line for
`multiparty call
`
`Step 1003
`
`/- Step 1005
`Verify that the inmate is authorized
`to communicate with each party to
`obtain verified parties
`
`/-Step 1007
`Send conference line to each
`party and to an administrator
`/- Step 1009
`Receive connections of parties
`/-Step 1011
`Confirm administrator is on call
`
`)
`
`C END
`FIG. 10
`
`0011
`
`
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 11 of 11
`
`US 8,917,848 B2
`
`( START )
`
`y Step 1101
`
`/-Step 1105
`
`y Step 1103
`
`Transmit controlled facility tone during call
`1r
`Test incoming audio for a received controlled facility tone
`r
`Generate call fingerprint for call
`>f
`y Step 1107
`Compare call fingerprint with call fingerprints from other facilities
`to determine whether inmate is improperly calling another facility
`>f
`y Step 1109
`Perform data mining on connection parameters of call
`y Step 1111
`>r
`Analyze voices on call to determine whether an unauthorized
`party is on call
`>r
`y Step 1113
`Analyze discussion in call to determine whether improper
`communications are being performed by inmate
`
`FIG. 11
`
`0012
`
`
`
`1
`CALL MANAGEMENT FOR SECURE
`FACILITIES
`
`BACKGROUND
`
`Controlled facilities, such as a jail, prison, secure detention
`environments, detention facility, secured hospital, or addic
`tion treatment facility, house large populations of individuals
`in confinement, which presents unique administrative chal
`lenges. In such detention environments, detained individuals,
`such as prisoners, offenders, convicts, military personnel,
`patients, government cleared personnel, or other detainees,
`frequently desire to communicate with individuals outside
`the detention environment such as friends or family members.
`
`SUMMARY
`
`In general, in one aspect, embodiments relate to a method
`for controlling a call in a first controlled facility. The method
`includes connecting an inmate in the first controlled facility to
`the call when each party of the call is verified, testing incom
`ing audio on the call to detect a controlled facility tone from
`a second controlled facility, and transmitting a notification of
`a violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`In general, in one aspect, embodiments relate to a system
`for controlling a call in a first controlled facility that includes
`a computer processor and a network application executing on
`the computer processor. The network application includes a
`connection module configured to connect an inmate in the
`first controlled facility to the call when each party of the call
`is verified. The call analysis module is configured to test
`incoming audio on the call to detect a controlled facility tone
`from a second controlled facility, and transmit a notification
`of a violation by the inmate when the controlled facility tone
`is detected in the incoming audio.
`In general, in one aspect, embodiments relate to a non-
`transitory computer readable medium for controlling a call in
`a first controlled facility. The non-transitory computer read
`able medium includes computer readable program code for
`connecting an inmate in the first controlled facility to the call
`when each party of the call is verified, testing incoming audio
`on the call to detect a controlled facility tone from a second
`controlled facility, and transmitting a notification of a first
`violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`In general, in one aspect, embodiments relate to a method
`for controlling a multiparty call in a detention center that
`includes receiving a request to connect an inmate in the deten
`tion center to parties in the multiparty call, verifying that each
`party is authorized to speak with the inmate, verifying that
`each party accepts the multiparty call before being connected
`to the inmate, and connecting each party that is authorized
`and that accepts to the multiparty call.
`Other aspects of the invention will be apparent from the
`following description and the appended claims.
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`FIGS. 1-7 show schematic diagrams of a system in one or
`more embodiments of the invention.
`FIGS. 8-11 show flowcharts of a method in one or more
`embodiments of the invention.
`
`DETAILED DESCRIPTION
`
`Specific embodiments of the invention will now be
`described in detail with reference to the accompanying fig
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,917,848 B2
`
`2
`ures. Like elements in the various figures are denoted by like
`reference numerals for consistency.
`In the following detailed description of embodiments of the
`invention, numerous specific details are set forth in order to
`provide a more thorough understanding of the invention.
`However, it will be apparent to one of ordinary skill in the art
`that the invention may be practiced without these specific
`details. In other instances, well-known features have not been
`described in detail to avoid unnecessarily complicating the
`description.
`In general, embodiments of the invention provide a method
`and system for controlling a call in a controlled facility. The
`call may be a single one-to-one call or a multiparty call. A
`multiparty call is a telephone call having more than two
`parties. For example, an inmate may call a second party, and
`the second party may call a third party. The second party may
`stay on the multiparty call or may leave the multiparty call.
`Further, the second party may be a person or software. The
`call may include text, audio, and video. Embodiments of the
`invention include functionality to determine whether an
`inmate is violating any rules during the call. For example, one
`rule may be that inmates may not contact inmates in other
`controlled facilities. In such an example, a controlled facility
`adds a tone to the audio in the call. When another controlled
`facility receives the call, the controlled facility may detect,
`based on the tone, that the call is from another controlled
`facility and, thus, that the inmate is violating the rule.
`Embodiments of the invention may include interactions
`with a secure social network. In one or more embodiments of
`the invention, a secure social network is a network application
`that facilitates and secures the exchange or transmission of
`information between two or more parties in which at least one
`of those parties is subject to special security or law enforce
`ment restrictions or otherwise resides in, or is subject to the
`controls of a controlled facility. Exchanged or transmitted
`information may be member generated, such as a photo or a
`video message, or it may be member-curated, such as a news
`headline, a famous quote, or a sports score.
`FIG. 1 shows a diagram of a system in accordance with one
`or more embodiments of the invention. As shown in FIG. 1,
`the system includes a controlled facility (100), an outside
`facility (102), third party providers (104), and an outsider
`computing device (106) each communicatively coupled to a
`communications network (108). The controlled facility (100)
`may include, but is not limited to, a kiosk (110), an adminis
`trator application (112), an inmate phone (114), and an
`inmate computing device (116). The outside facility (102)
`may include an application server (118) and a database server
`(120). The third party providers (104) may include a media
`server (122), a web server (124), and a datacenter (126). The
`outsider computing device (106) may include an outsider
`application (128).
`In one or more embodiments of the invention, a controlled
`facility (100) is an access-restricted location. Examples of
`controlled facilities (e.g., controlled facility (100)) include,
`but are not limited to, detention environments (e.g., jails,
`prisons, etc.), immigration detention centers, military cen
`ters, government secure sites, law enforcement holding struc
`tures, secure business complexes, and psychiatric hospitals.
`In one or more embodiments of the invention, an inmate is
`a person within a controlled facility (100) who is subject to
`one or more restrictions, primarily to his or her freedom or
`rights. Examples of inmates include, but are not limited to,
`prisoners, wards of the state, parolees, employees working in
`a secure business complex, temporary or long-term internees,
`patients, military personnel, uncharged suspects, and refu
`gees. Inmate restrictions may be part of a court-imposed
`
`0013
`
`
`
`US 8,917,848 B2
`
`3
`sentence on an inmate, while others may be specific to the
`controlled facility (100) in which the inmate resides. Restric
`tions may include limitations on an inmate’s physical move
`ment (i.e., physical restrictions) and limitations on the
`inmate’s ability to communicate (i.e., communicationrestric-
`tions). Communication restrictions
`include inmate use
`restrictions, inmate target restrictions, and device use restric
`tions.
`In one or more embodiments of the invention, inmate use
`restrictions are limitations on an inmate’s general ability to
`communicate with visitors and/or outsiders. Inmate use
`restrictions may include, for example, periods of time in
`which an inmate is not allowed to communicate with outsid
`ers or visitors (e.g., between 10 PM and 8 AM, during an
`imposed one-week punitive period, etc.) and limitations
`based on lack of funds (e.g., insufficient commissary account
`balance to initiate a communication).
`In one or more embodiments of the invention, inmate target
`restrictions are limitations on the target or source of a com
`munication with the inmate. Inmate target restrictions may be
`specific outsiders or visitors with whom the inmate is not
`allowed to communicate (e.g., the victim of a crime perpe
`trated by the inmate, etc.). Inmate target restrictions may also
`include types of people with whom the inmate is not allowed
`contact (e.g., outsiders who are ex-cons, minors under the age
`of 18, etc.).
`In one or more embodiments of the invention, device use
`restrictions are restrictions based on the condition or state of
`the communication device used by the inmate. Device use
`restrictions include, for example, limitations based on the
`location of the inmate’s mobile device, limitations imposed
`based on a determination that the device has been tampered
`with, etc.
`In one or more embodiments of the invention, an outsider is
`a person outside the controlled facility (100) who may be the
`source or target of a communication with an inmate. An
`outsider who enters the controlled facility (100) for the pur
`pose of communicating with an inmate is referred to as a
`visitor.
`In one or more embodiments of the invention, the kiosk
`(110) is a computing system with functionality to facilitate
`communication between an inmate and a visitor or outsider.
`Such communication facilitation may include creating a sys
`tem identity data item or secure social networking account,
`adding or importing contact information for outsiders with
`whom the inmate wishes to communicate, uploading media
`(e.g., photos, videos, audio, and text) to, or viewing media
`from, a secure social network, sending or receiving messages
`or other media, acting as an endpoint for voice and video
`communication between an inmate and a visitor or outsider,
`scheduling a communication, and managing a commissary or
`communications account. Further detail about kiosks (e.g.,
`kiosk (110)) is provided in FIG. 2, FIG. 5A, FIG. 5B, and FIG.
`6.
`
`In one or more embodiments of the invention, the admin
`istrator application (112) is a process or group of processes
`executing on a computing system with functionality to enable
`an administrator to create, remove, and/or enforce one or
`more restrictions on an inmate. In one or more embodiments
`of the invention, an administrator is a person associated with
`the controlled facility charged with enforcing one or more
`restrictions. Examples of administrators include, but are not
`limited to, prison guards, orderlies, wardens, prison staff,
`jailers, information technology technicians, system adminis
`trators, and law enforcement agents. Using the administrator
`application, an administrator may retrieve or alter the identity
`data item and/or secure social network account of an inmate,
`
`4
`visitor, or outsider. Further detail about the administrator
`application (112) is provided in FIG. 2.
`In one or more embodiments of the invention, the inmate
`phone (114) is a device with functionality to send and receive
`audio communications between an inmate and an outsider or
`visitor. In one or more embodiments of the invention, the
`inmate phone (114) is a stationary (i.e., non-mobile) device.
`Further, a single inmate phone (114) may be used by more
`than one inmate. Further detail about the inmate phone (114)
`is provided in FIG. 2.
`In one or more embodiments of the invention, the inmate
`computing device (116) is a computing device with function
`ality to enable an inmate to communicate with a visitor or
`outsider. Specifically, the inmate computing device (116)
`may be used to send or receive text messages and/or initiate or
`receive voice or video calls. In one or more embodiments of
`the invention, the inmate computing device (116) also enables
`an inmate to access a secure social network. Specifically, the
`inmate computing device (116) may be used to upload media
`to, or view media from, a secure social network account of the
`inmate or another secure social network member. In one or
`more embodiments of the invention, the inmate computing
`device (116) is a mobile computing device (e.g., a smart
`phone, a laptop, a tablet, etc.). Further detail about the inmate
`computing device (116) is provided in FIG. 2 and FIG. 6.
`In one or more embodiments of the invention, the elements
`within the controlled facility (100) are communicatively
`coupled to the communications network (108). In one or more
`embodiments of the invention, the communications network
`(108) is a collection of computing systems and other hard
`ware interconnected by communication channels. The com
`munications network (108) may include networks that are
`exclusively or primarily used for a single type of communi
`cation, such as a telephone network (e.g., Plain Old Tele
`phone System (POTS)), and/or networks used for a wide
`array of communication types, such as the Internet through
`Voice over IP (VOIP). Communication channels used by the
`communications network (108) may include, for example,
`telephone lines, networking cables, wireless signals, radio
`waves, etc. Fees charged and payments received by the pro
`vider^) of the communications network (108) may involve
`multiple parties, including a service provider of the outside
`facility (102), the management of the controlled facility
`(100), and provider(s) of the communications network (108).
`In one or more embodiments of the invention, fees may be
`split between multiple parties based on the terms of underly
`ing agreements or contracts between the parties. Further,
`rebates, reimbursements, and/or refunds may be afforded to
`and paid to the management of the controlled facility (100)
`based on the terms of underlying agreements or contracts
`between the parties. For example, the management of the
`controlled facility (100) may receive a rebate from the service
`provider of the services provided to inmates based on such
`factors as the volume of use, the dollar amount, and/or the
`frequency of use.
`In one or more embodiments of the invention, the outside
`facility (102) is a group of computing systems located outside
`of the controlled facility (100). Specifically, the outside facil
`ity (102) may house system elements with functionality to
`facilitate communication between inmates and outsiders,
`access communication data between inmates and outsiders,
`and enforce one or more restrictions imposed on inmates and
`inmate communications. In one or more embodiments of the
`invention, the outside facility (102) is connected directly to
`the controlled facility (100) bypassing a generally accessible
`communications network (communications network (108)).
`One or more of the components within the outside facility
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`0014
`
`
`
`5
`(102) may alternatively be located within the controlled facil
`ity (100) or within the third party providers (104).
`In one or more embodiments of the invention, the applica
`tion server (118) is a computing system with functionality to
`authenticate an inmate, outsider, administrator, reviewer, or
`investigator for access to system functionality (e.g., initiating
`voice or video calls, sending text messages, etc.) or data
`stored on the database server (120) (e.g., inmate identities,
`communications between inmates and outsiders, etc.). The
`application server may authenticate inmates, outsiders,
`administrators, reviewers, and/or investigators using pass
`words, biometric data, digital access codes, and/or physical
`access devices. Further detail about the application server
`(118) is provided in FIG. 3.
`In one or more embodiments of the invention, the database
`server (120) is a computing system with functionality to store
`identities used to authenticate inmates, outsiders, administra
`tors, reviewers, and/or investigators. Such identities may
`include verified data used to compare to verification data
`provided by the inmate, outsider, administrator, reviewer, or
`investigator to authenticate the inmate, outsider, administra
`tor, reviewer, or investigator.
`In one or more embodiments of the invention, the database
`server (120) also stores communication data about commu
`nications between an inmate and an outsider or visitor. Such
`communication data may include, for example, a recording of
`a video call, the length of a voice call, the frequency of video
`calls, sent and received text messages, etc. The database
`server (120) may also store media submitted to a secure social
`network before, during, and/or after the media has been
`reviewed. Further detail about the database server (120) is
`provided in FIG. 3.
`In one or more embodiments of the invention, the third
`party providers (104) are computing systems that provide
`network application and data storage services (i.e., cloud
`computing services). Thirdparty providers (104) may include
`service providers used directly by inmates and outsiders, such
`as photo sharing services, general social networking sites,
`and digital music retailers. Third party providers (104) may
`include service providers employed by administrators and for
`use by inmates and outsiders, such as audio and video stream
`ing applications, conferencing applications, and secure social
`network media storage. One or more of the components
`within the third party providers (104) may alternatively be
`located within the controlled facility (100) or the outside
`facility (102).
`In one or more embodiments of the invention, the media
`server (122) is a computing system or group of computing
`system with functionality to provide network application ser
`vices to facilitate communication between an inmate and an
`outsider, and to facilitate access to a secure social network.
`Such services include, but are not limited to, VoIP services,
`video conferencing services, and media streaming services.
`In one or more embodiments of the invention, the web
`server (124) is a computing system or group of computing
`system with functionality to provide an interface to access
`and interact with webpages and other network application
`services. In one or more embodiments of the invention, the
`web server (124) is a type of media server (122).
`In one or more embodiments of the invention, the data
`center (126) is a computing system or group of computing
`system with functionality to provide an interface to access
`and interact with data stored on one or more data servers (not
`shown). In one or more embodiments of the invention, the
`datacenter (126) is a type of media server (122).
`In one or more embodiments of the invention, the outsider
`computing device (106) is a computing device with function
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,917,848 B2
`
`6
`ality to execute the outsider application (128). In one or more
`embodiments of the invention, the outsider computing device
`(106) is a mobile computing device (e.g., a smartphone, a
`laptop, a tablet, etc.). Further detail about the outsider com
`puting device (106) is provided in FIG. 6.
`In one or more embodiments of the invention, the outsider
`application (128) is a process or group of processes (in soft
`ware, firmware, hardware, or combination thereof) with func
`tionality to enable communication between an outsider and
`an inmate. Specifically, the outsider application (128) may be
`used to send or receive text messages and/or initiate orreceive
`voice or video calls. In one or more embodiments of the
`invention, the outsider application (128) also enables an out
`sider to access a secure social network. Specifically, the out
`sider application (128) may be used to upload media to, or
`view media from, a secure social network account of the
`outsider, an inmate, other secure social network member.
`FIG. 2 shows a controlled facility in accordance with one or
`more embodiments of the invention. As shown in FIG. 2, the
`controlled facility (200) may include a visitor kiosk (202), a
`booking kiosk (204), an administrator computing device
`(206), an inmate kiosk (208), an inmate phone (210), an
`inmate computing device (212), and a local server (214). The
`inmate computing device (212) and the local server (214) are
`communicatively coupled to the communications network
`(216). The administrator computing device (206) includes an
`administrator application (218). The inmate computing
`device (212) includes an inmate application (220).
`In one or more embodiments of the invention, the visitor
`kiosk (202) is a computing system with functionality to facili
`tate communication between an inmate and a visitor. Specifi
`cally, the visitor kiosk (202) may be a combination of com
`puting hardware and software used by a visitor to make and
`receive voice and video calls to/from an inmate residing in the
`same controlled facility (200) or another controlled facility
`(not shown). The visitor kiosk (202) may also be used to
`schedule a voice or video call with an inmate for a future date.
`Further, the visitor kiosk (202) may also include the function
`ality to exchange media (e.g., photos, videos, and audio) with
`an inmate residing in the controlled facility (200). The visitor
`kiosk (202) may include functionality to generate suchmedia,
`such as a camera, microphone, keyboard, and software to
`record or otherwise create media to send to an inmate. Such
`media may be subject to review before being delivered.
`In one or more embodiments of the invention, a visitor
`wanting to use a visitor kiosk (202) may be required to par
`ticipate in an authentication process to verify the identity of
`the visitor. The authentication process may include creating
`an identity data item and verified data for storage and later
`comparison. The verified data used for authentication may be
`a username and password combination and/or biometric
`information about the visitor.
`In one or more embodiments of the invention, the visitor
`kiosk (202) includes functionality to access a secure social
`network. Specifically, the visitor kiosk (202) may be used by
`a visitor to create and manage a secure social network
`account. The visitor kiosk (202) may also be used by a visitor
`to upload digital media to the visitor’s secure social network
`account or the account of another secure social network mem
`ber. The visitor kiosk (202) may further be used to view
`digital media uploaded to the visitor’s social network account
`or the account of another secure social network member.
`In one or more embodiments of the invention, the visitor
`kiosk (202) includes functionality to manage a commissary
`account for one or more inmates. Specifically, a visitor may
`use a visitor kiosk (202) to add money to the commissary
`account of an inmate in the controlled facility (200), view a
`
`0015
`
`
`
`7
`transaction history of the commissary account, transfer funds
`between commissary accounts, and/or remove funds from a
`commissary account. Further detail about the visitor kiosk
`(202) is provided in FIG. 5A and FIG. 5B.
`In one or more embodiments of the invention, the booking
`kiosk (204) is a computing system with functionality to aid
`administrators in admitting an inmate into a controlled facil
`ity (e.g., controlled facility (200)). Specifically, the booking
`kiosk (204) may include functionality to create or update an
`inmate identity data item. Specifically, the booking kiosk
`(204) may be used to obtain verified data (e.g., passwords,
`biometric data, etc.) and save the verification data in one or
`more identity data items for the inmate. The verified data may
`then be used to authenticate the inmate (e.g., to access the
`communications network (216), etc.). In one or more embodi
`ments of the invention, the booking kiosk may also be used to
`associate one or more restrictions with the inmate via the
`inmate’s identity data item.
`In one or more embodiments of the invention, the booking
`kiosk (204) includes functionality to input contact informa
`tion for visitors, outsiders, administrators, or other inmates
`with whom the inmate wants to communicate. Such contact
`information may then be associated with the inmate’s identity
`data item, and may be used to initiate a voice or video call, or
`otherwise transmit media to visitors, outsiders, or other
`inmates. Further, in one or more embodiments of the inven
`tion, the contact information may be retrieved from an
`inmate’s mobile computing device (e.g., cell phone, smart
`phone, etc.) or a local or remote data storage device (e.g., a
`flash drive, a webmail account, etc.). The contact information
`may be retrieved using a wired or wireless connection
`between the booking kiosk and the inmate’s mobile comput
`ing device and/or the data storage device. The contact infor
`mation may be subject to review before the inmate is permit
`ted to contact the visitor, outsider, administrator, or other
`inmate.
`In one or more embodiments of the invention, the booking
`kiosk (204) includes functionality to prepare a mobile com
`puting device for use by the inmate within the controlled
`facility (200). Specifically, a controlled facility (200) may
`allow inmates the use of computing devices while in or sub
`ject to the controlled