throbber
(i2) United States Patent
`Torgersrud et al.
`
`(io) Patent No.:
`(45) Date of Patent:
`
`US 8,917,848 B2
`Dec. 23, 2014
`
`US008917848B2
`
`(54) CALL MANAGEMENT FOR SECURE
`FACILITIES
`
`(71) Applicant: Telmate LLC, San Francisco, CA (US)
`
`(72)
`
`Inventors: Richard Torgersrud, San Francisco, CA
`(US); Christopher Ditto, San Jose, CA
`(US); Morgan Collins, San Mateo, CA
`(US)
`
`(73) Assignee: Telmate, LLC, San Francisco, CA (US)
`
`( * ) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(21) Appl.No.: 13/843,461
`
`(22) Filed:
`
`Mar. 15, 2013
`
`(65)
`
`Prior Publication Data
`US 2014/0270126 A1
`Sep. 18, 2014
`
`(51)
`
`(2006.01)
`(2006.01)
`
`Int.Cl.
`H04M3/42
`H04M3/38
`(52) U.S. Cl.
`CPC ...................................... H 04M 3/382 (2013.01)
`USPC ............... 379/202.01; 379/142.05; 379/88.02
`(58) Field of Classification Search
`USPC .............................. 379/202.01,88.02,142.05
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,768,355 A
`5,769,811 A
`
`6/1998 Salibrici et al.
`6/1998 Stacey et al.
`
`9/1998 McFarlen
`5,805,685 A
`7/2004 Blink
`6,763,099 B1
`8,135,127 B2 * 3/2012 K itchinetal..................... 379/350
`8,648,894 B2 * 2/2014 Laneyetal.................... 348/14.03
`2007/0071206 Al * 3/2007 Gainsboro et al............... 379/168
`8/2011 Hodge ............................ 370/352
`2011/0206038 Al *
`OTHER PUBLICATIONS
`
`Mazurczyk, W. and Kotulski Z.,“New VoIP Traffic Security Scheme
`with Digital Watermarking”; Warsaw University of Technology;
`Warszawa, Poland; 2006 (12 pages).
`http://web.archive.org/web/
`“Lattice
`Incorporated”;
`20120121002059/http://latticeinc.com/product; Accessed on Mar.
`10, 2014 (3 pages).
`Dabrowski, A et al.; “Real-time watermarking of one side of tele­
`phone conversation for speaker segmentation”; Poznan University of
`Technology; Jun. 2012 (6 pages).
`Kirovski, D and Malvar, H.; “Spread-Spectrum Watermarking of
`Audio Signals”; Fellow, IEEE Transactions on Signal Processing,
`vol. 51, No. 4, Apr. 2003 (14 pages).
`Wang, X., Chen, S. and Jajodia S.; “Tracking Anonymous Peer-to-
`PeerVoIP Calls on the Internet”; Alexandria, VA Nov. 7-11,2005 (11
`pages).
`
`* cited by examiner
`
`Primary Examiner — Quynh Nguyen
`(74) Attorney, Agent, or Firm — Osha Liang LLP
`
`ABSTRACT
`(57)
`A method for controlling a call in a first controlled facility
`includes connecting an inmate in the first controlled facility to
`the call when each party of the call is verified, testing incom­
`ing audio on the call to detect a controlled facility tone from
`a second controlled facility, and transmitting a notification of
`a violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`
`19 Claims, 11 Drawing Sheets
`
`GTL 1007
`PGR of U.S. Pat. No. 8,929,525
`
`0001
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 1 of 11
`
`US 8,917,848 B2
`
`
`
`hmaow.282
`
`fl
`
`.miownm>>
`
`fl
`
`aLoEooSmo
`
`a{0262
`
`$9330
`
`a83mmmczquoo
`
`$9330
`
`aco_#mo__qq<
`
`FGE
`
`BwEE
`
`mESanO
`
`%83mm
`
`>th95
`
`§28381
`
`
`
` a526$8:938
`
`a30:1EmEE
`
`acosmo=qq<
`
`LESBEEE wcozmoEsEEoo
`
`
`
` a350m“.@2330
`
`co_“mo__aa<
`
`aEimm
`
`agmaom$838
`
`0002
`
`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 1 of 11
`
`US 8,917,848 B2
`
`FIG. 1
`
`0002
`
`
`
`
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 2 of 11
`
`US 8,917,848 B2
`
`ongE
`
`%83mmmESQEoo
`
`BmEE
`
`%cozmo__aa<
`
`mcozmoEsEEoo
`
`%x5262
`
`N.OE
`
`%83mmmESQEoo
`
`LoambEEEU/x
`
`x82Lo:w_> ac2323.”?
`aafig98:;SEE:x82mHmEExmoimczoom
`
`
`
`333mm:83
`
`0003
`
`LogmwaEU/x%
`
`
`
`526$36:80
`
`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 2 of 11
`
`US 8,917,848 B2
`
`FIG. 2
`
`0003
`
`
`
`

`

`U.S. Patent
`
`Dec. 23,2014
`
`Sheet 3 of 11
`
`US 8,917,848 B2
`
`FIG. 3
`
`Application
`Investigator
`
`314
`
`Application
`Reviewer
`
`312
`
`Computing Device
`
`308
`
`Investigator
`
`I
`
`Computing Device
`
`Reviewer
`
`306
`
`Application Server
`
`302 iL Database Server
`
`304
`
`Outside Facility
`
`300
`
`0004
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 4 of 11
`
`US 8,917,848 B2
`
`Computing
`System
`400
`
`FIG. 4
`
`0005
`
`

`

`US. Patent
`
`Dec. 23, 2014
`
`Sheet 5 of 11
`
`US 8,917,848 B2
`
`Video Visitation Kiosk
`500
`
`
`
`
`FIG. 5A
`
`0006
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 5 of 11
`
`US 8,917,848 B2
`
`0006
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 6 of 11
`
`US 8,917,848 B2
`
`Video Visitation Kiosk
`500
`
`FIG. 5B
`
`0007
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 7 of 11
`
`US 8,917,848 B2
`
`Mobile Computing
`Device
`600
`
`FIG. 6
`
`0008
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 8 of 11
`
`US 8,917,848 B2
`
`Network Application
`700
`Party Verification
`Module
`704
`
`Call Analysis
`Module
`706
`
`Connection Module
`708
`
`Datacenter Server
`702
`Inmate Account
`712
`Telephone
`Network List
`720
`Incarceration
`Information
`722
`
`Saved
`Communications
`716
`
`User Interface
`710
`
`Party Voiceprint Data
`718
`
`FIG. 7
`
`0009
`
`

`

`US. Patent
`
`Dec. 23, 2014
`
`Sheet 9 of 11
`
`US 8,917,848 B2
`
` Step 801
`
`Establish a two-way call between inmate and another party
`
`Step 803
`Receive
`
`call? NO
`request to add a party to the
`
`
`END
`
`
`Step 805
`Use
`
`inmate's telephone
`
`NO
`
`Step 811
`
`Present inmate telephone network
`list to inmate
`
`Receive new number from inmate
`
`network list?
`
`
`
`
`
`
`Step 809
`
`Step 813
`
`Identify owner of number
`
`Step 817
`
`Step 815
`
`YES
`
`ls number authorized?
`
`Step 819
`
`
`
`Receive selection of a contact from
`
`the inmate telephone network list
`
`Contact new party for call
`
`Inform new party of connection to
`controlled facility
`
`
`
`
`
`
`”0
`
`FIG. 8
`
`NO
`
`New party accepts?
`
`Step 821
`
`YES
`
`NO
`Step 823
`
` ls
`party that answered
`
`authorized?
`
`Connect new party to existing call
`
` Y
`
`Step 823
`
`ES
`
`0010
`
`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 9 of 11
`
`US 8,917,848 B2
`
`0010
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 10 of 11
`
`US 8,917,848 B2
`
`( START )
`______j______
`Receive, from an inmate, a
`request for a multi-party call
`
`/- Step 901
`
`f Step 903
`Receive a party identifier for each
`party to the call
`f- Step 905
`Verify that the inmate is authorized
`to communicate with each party to
`obtain verified parties
`r Step 907
`
`Attempt to connect to verified
`parties
`_______ i_______
`Inform inmate of status of
`connecting parties to the call
`
`/- Step 909r
`
`( START )
`
`f Step 1001
`Receive, from an inmate, a
`request for a multi-party call
`
`Generate conference line for
`multiparty call
`
`Step 1003
`
`/- Step 1005
`Verify that the inmate is authorized
`to communicate with each party to
`obtain verified parties
`
`/-Step 1007
`Send conference line to each
`party and to an administrator
`/- Step 1009
`Receive connections of parties
`/-Step 1011
`Confirm administrator is on call
`
`)
`
`C END
`FIG. 10
`
`0011
`
`

`

`U.S. Patent
`
`Dec. 23, 2014
`
`Sheet 11 of 11
`
`US 8,917,848 B2
`
`( START )
`
`y Step 1101
`
`/-Step 1105
`
`y Step 1103
`
`Transmit controlled facility tone during call
`1r
`Test incoming audio for a received controlled facility tone
`r
`Generate call fingerprint for call
`>f
`y Step 1107
`Compare call fingerprint with call fingerprints from other facilities
`to determine whether inmate is improperly calling another facility
`>f
`y Step 1109
`Perform data mining on connection parameters of call
`y Step 1111
`>r
`Analyze voices on call to determine whether an unauthorized
`party is on call
`>r
`y Step 1113
`Analyze discussion in call to determine whether improper
`communications are being performed by inmate
`
`FIG. 11
`
`0012
`
`

`

`1
`CALL MANAGEMENT FOR SECURE
`FACILITIES
`
`BACKGROUND
`
`Controlled facilities, such as a jail, prison, secure detention
`environments, detention facility, secured hospital, or addic­
`tion treatment facility, house large populations of individuals
`in confinement, which presents unique administrative chal­
`lenges. In such detention environments, detained individuals,
`such as prisoners, offenders, convicts, military personnel,
`patients, government cleared personnel, or other detainees,
`frequently desire to communicate with individuals outside
`the detention environment such as friends or family members.
`
`SUMMARY
`
`In general, in one aspect, embodiments relate to a method
`for controlling a call in a first controlled facility. The method
`includes connecting an inmate in the first controlled facility to
`the call when each party of the call is verified, testing incom­
`ing audio on the call to detect a controlled facility tone from
`a second controlled facility, and transmitting a notification of
`a violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`In general, in one aspect, embodiments relate to a system
`for controlling a call in a first controlled facility that includes
`a computer processor and a network application executing on
`the computer processor. The network application includes a
`connection module configured to connect an inmate in the
`first controlled facility to the call when each party of the call
`is verified. The call analysis module is configured to test
`incoming audio on the call to detect a controlled facility tone
`from a second controlled facility, and transmit a notification
`of a violation by the inmate when the controlled facility tone
`is detected in the incoming audio.
`In general, in one aspect, embodiments relate to a non-
`transitory computer readable medium for controlling a call in
`a first controlled facility. The non-transitory computer read­
`able medium includes computer readable program code for
`connecting an inmate in the first controlled facility to the call
`when each party of the call is verified, testing incoming audio
`on the call to detect a controlled facility tone from a second
`controlled facility, and transmitting a notification of a first
`violation by the inmate when the controlled facility tone is
`detected in the incoming audio.
`In general, in one aspect, embodiments relate to a method
`for controlling a multiparty call in a detention center that
`includes receiving a request to connect an inmate in the deten­
`tion center to parties in the multiparty call, verifying that each
`party is authorized to speak with the inmate, verifying that
`each party accepts the multiparty call before being connected
`to the inmate, and connecting each party that is authorized
`and that accepts to the multiparty call.
`Other aspects of the invention will be apparent from the
`following description and the appended claims.
`
`BRIEF DESCRIPTION OF DRAWINGS
`
`FIGS. 1-7 show schematic diagrams of a system in one or
`more embodiments of the invention.
`FIGS. 8-11 show flowcharts of a method in one or more
`embodiments of the invention.
`
`DETAILED DESCRIPTION
`
`Specific embodiments of the invention will now be
`described in detail with reference to the accompanying fig­
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,917,848 B2
`
`2
`ures. Like elements in the various figures are denoted by like
`reference numerals for consistency.
`In the following detailed description of embodiments of the
`invention, numerous specific details are set forth in order to
`provide a more thorough understanding of the invention.
`However, it will be apparent to one of ordinary skill in the art
`that the invention may be practiced without these specific
`details. In other instances, well-known features have not been
`described in detail to avoid unnecessarily complicating the
`description.
`In general, embodiments of the invention provide a method
`and system for controlling a call in a controlled facility. The
`call may be a single one-to-one call or a multiparty call. A
`multiparty call is a telephone call having more than two
`parties. For example, an inmate may call a second party, and
`the second party may call a third party. The second party may
`stay on the multiparty call or may leave the multiparty call.
`Further, the second party may be a person or software. The
`call may include text, audio, and video. Embodiments of the
`invention include functionality to determine whether an
`inmate is violating any rules during the call. For example, one
`rule may be that inmates may not contact inmates in other
`controlled facilities. In such an example, a controlled facility
`adds a tone to the audio in the call. When another controlled
`facility receives the call, the controlled facility may detect,
`based on the tone, that the call is from another controlled
`facility and, thus, that the inmate is violating the rule.
`Embodiments of the invention may include interactions
`with a secure social network. In one or more embodiments of
`the invention, a secure social network is a network application
`that facilitates and secures the exchange or transmission of
`information between two or more parties in which at least one
`of those parties is subject to special security or law enforce­
`ment restrictions or otherwise resides in, or is subject to the
`controls of a controlled facility. Exchanged or transmitted
`information may be member generated, such as a photo or a
`video message, or it may be member-curated, such as a news
`headline, a famous quote, or a sports score.
`FIG. 1 shows a diagram of a system in accordance with one
`or more embodiments of the invention. As shown in FIG. 1,
`the system includes a controlled facility (100), an outside
`facility (102), third party providers (104), and an outsider
`computing device (106) each communicatively coupled to a
`communications network (108). The controlled facility (100)
`may include, but is not limited to, a kiosk (110), an adminis­
`trator application (112), an inmate phone (114), and an
`inmate computing device (116). The outside facility (102)
`may include an application server (118) and a database server
`(120). The third party providers (104) may include a media
`server (122), a web server (124), and a datacenter (126). The
`outsider computing device (106) may include an outsider
`application (128).
`In one or more embodiments of the invention, a controlled
`facility (100) is an access-restricted location. Examples of
`controlled facilities (e.g., controlled facility (100)) include,
`but are not limited to, detention environments (e.g., jails,
`prisons, etc.), immigration detention centers, military cen­
`ters, government secure sites, law enforcement holding struc­
`tures, secure business complexes, and psychiatric hospitals.
`In one or more embodiments of the invention, an inmate is
`a person within a controlled facility (100) who is subject to
`one or more restrictions, primarily to his or her freedom or
`rights. Examples of inmates include, but are not limited to,
`prisoners, wards of the state, parolees, employees working in
`a secure business complex, temporary or long-term internees,
`patients, military personnel, uncharged suspects, and refu­
`gees. Inmate restrictions may be part of a court-imposed
`
`0013
`
`

`

`US 8,917,848 B2
`
`3
`sentence on an inmate, while others may be specific to the
`controlled facility (100) in which the inmate resides. Restric­
`tions may include limitations on an inmate’s physical move­
`ment (i.e., physical restrictions) and limitations on the
`inmate’s ability to communicate (i.e., communicationrestric-
`tions). Communication restrictions
`include inmate use
`restrictions, inmate target restrictions, and device use restric­
`tions.
`In one or more embodiments of the invention, inmate use
`restrictions are limitations on an inmate’s general ability to
`communicate with visitors and/or outsiders. Inmate use
`restrictions may include, for example, periods of time in
`which an inmate is not allowed to communicate with outsid­
`ers or visitors (e.g., between 10 PM and 8 AM, during an
`imposed one-week punitive period, etc.) and limitations
`based on lack of funds (e.g., insufficient commissary account
`balance to initiate a communication).
`In one or more embodiments of the invention, inmate target
`restrictions are limitations on the target or source of a com­
`munication with the inmate. Inmate target restrictions may be
`specific outsiders or visitors with whom the inmate is not
`allowed to communicate (e.g., the victim of a crime perpe­
`trated by the inmate, etc.). Inmate target restrictions may also
`include types of people with whom the inmate is not allowed
`contact (e.g., outsiders who are ex-cons, minors under the age
`of 18, etc.).
`In one or more embodiments of the invention, device use
`restrictions are restrictions based on the condition or state of
`the communication device used by the inmate. Device use
`restrictions include, for example, limitations based on the
`location of the inmate’s mobile device, limitations imposed
`based on a determination that the device has been tampered
`with, etc.
`In one or more embodiments of the invention, an outsider is
`a person outside the controlled facility (100) who may be the
`source or target of a communication with an inmate. An
`outsider who enters the controlled facility (100) for the pur­
`pose of communicating with an inmate is referred to as a
`visitor.
`In one or more embodiments of the invention, the kiosk
`(110) is a computing system with functionality to facilitate
`communication between an inmate and a visitor or outsider.
`Such communication facilitation may include creating a sys­
`tem identity data item or secure social networking account,
`adding or importing contact information for outsiders with
`whom the inmate wishes to communicate, uploading media
`(e.g., photos, videos, audio, and text) to, or viewing media
`from, a secure social network, sending or receiving messages
`or other media, acting as an endpoint for voice and video
`communication between an inmate and a visitor or outsider,
`scheduling a communication, and managing a commissary or
`communications account. Further detail about kiosks (e.g.,
`kiosk (110)) is provided in FIG. 2, FIG. 5A, FIG. 5B, and FIG.
`6.
`
`In one or more embodiments of the invention, the admin­
`istrator application (112) is a process or group of processes
`executing on a computing system with functionality to enable
`an administrator to create, remove, and/or enforce one or
`more restrictions on an inmate. In one or more embodiments
`of the invention, an administrator is a person associated with
`the controlled facility charged with enforcing one or more
`restrictions. Examples of administrators include, but are not
`limited to, prison guards, orderlies, wardens, prison staff,
`jailers, information technology technicians, system adminis­
`trators, and law enforcement agents. Using the administrator
`application, an administrator may retrieve or alter the identity
`data item and/or secure social network account of an inmate,
`
`4
`visitor, or outsider. Further detail about the administrator
`application (112) is provided in FIG. 2.
`In one or more embodiments of the invention, the inmate
`phone (114) is a device with functionality to send and receive
`audio communications between an inmate and an outsider or
`visitor. In one or more embodiments of the invention, the
`inmate phone (114) is a stationary (i.e., non-mobile) device.
`Further, a single inmate phone (114) may be used by more
`than one inmate. Further detail about the inmate phone (114)
`is provided in FIG. 2.
`In one or more embodiments of the invention, the inmate
`computing device (116) is a computing device with function­
`ality to enable an inmate to communicate with a visitor or
`outsider. Specifically, the inmate computing device (116)
`may be used to send or receive text messages and/or initiate or
`receive voice or video calls. In one or more embodiments of
`the invention, the inmate computing device (116) also enables
`an inmate to access a secure social network. Specifically, the
`inmate computing device (116) may be used to upload media
`to, or view media from, a secure social network account of the
`inmate or another secure social network member. In one or
`more embodiments of the invention, the inmate computing
`device (116) is a mobile computing device (e.g., a smart­
`phone, a laptop, a tablet, etc.). Further detail about the inmate
`computing device (116) is provided in FIG. 2 and FIG. 6.
`In one or more embodiments of the invention, the elements
`within the controlled facility (100) are communicatively
`coupled to the communications network (108). In one or more
`embodiments of the invention, the communications network
`(108) is a collection of computing systems and other hard­
`ware interconnected by communication channels. The com­
`munications network (108) may include networks that are
`exclusively or primarily used for a single type of communi­
`cation, such as a telephone network (e.g., Plain Old Tele­
`phone System (POTS)), and/or networks used for a wide
`array of communication types, such as the Internet through
`Voice over IP (VOIP). Communication channels used by the
`communications network (108) may include, for example,
`telephone lines, networking cables, wireless signals, radio
`waves, etc. Fees charged and payments received by the pro­
`vider^) of the communications network (108) may involve
`multiple parties, including a service provider of the outside
`facility (102), the management of the controlled facility
`(100), and provider(s) of the communications network (108).
`In one or more embodiments of the invention, fees may be
`split between multiple parties based on the terms of underly­
`ing agreements or contracts between the parties. Further,
`rebates, reimbursements, and/or refunds may be afforded to
`and paid to the management of the controlled facility (100)
`based on the terms of underlying agreements or contracts
`between the parties. For example, the management of the
`controlled facility (100) may receive a rebate from the service
`provider of the services provided to inmates based on such
`factors as the volume of use, the dollar amount, and/or the
`frequency of use.
`In one or more embodiments of the invention, the outside
`facility (102) is a group of computing systems located outside
`of the controlled facility (100). Specifically, the outside facil­
`ity (102) may house system elements with functionality to
`facilitate communication between inmates and outsiders,
`access communication data between inmates and outsiders,
`and enforce one or more restrictions imposed on inmates and
`inmate communications. In one or more embodiments of the
`invention, the outside facility (102) is connected directly to
`the controlled facility (100) bypassing a generally accessible
`communications network (communications network (108)).
`One or more of the components within the outside facility
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`0014
`
`

`

`5
`(102) may alternatively be located within the controlled facil­
`ity (100) or within the third party providers (104).
`In one or more embodiments of the invention, the applica­
`tion server (118) is a computing system with functionality to
`authenticate an inmate, outsider, administrator, reviewer, or
`investigator for access to system functionality (e.g., initiating
`voice or video calls, sending text messages, etc.) or data
`stored on the database server (120) (e.g., inmate identities,
`communications between inmates and outsiders, etc.). The
`application server may authenticate inmates, outsiders,
`administrators, reviewers, and/or investigators using pass­
`words, biometric data, digital access codes, and/or physical
`access devices. Further detail about the application server
`(118) is provided in FIG. 3.
`In one or more embodiments of the invention, the database
`server (120) is a computing system with functionality to store
`identities used to authenticate inmates, outsiders, administra­
`tors, reviewers, and/or investigators. Such identities may
`include verified data used to compare to verification data
`provided by the inmate, outsider, administrator, reviewer, or
`investigator to authenticate the inmate, outsider, administra­
`tor, reviewer, or investigator.
`In one or more embodiments of the invention, the database
`server (120) also stores communication data about commu­
`nications between an inmate and an outsider or visitor. Such
`communication data may include, for example, a recording of
`a video call, the length of a voice call, the frequency of video
`calls, sent and received text messages, etc. The database
`server (120) may also store media submitted to a secure social
`network before, during, and/or after the media has been
`reviewed. Further detail about the database server (120) is
`provided in FIG. 3.
`In one or more embodiments of the invention, the third
`party providers (104) are computing systems that provide
`network application and data storage services (i.e., cloud
`computing services). Thirdparty providers (104) may include
`service providers used directly by inmates and outsiders, such
`as photo sharing services, general social networking sites,
`and digital music retailers. Third party providers (104) may
`include service providers employed by administrators and for
`use by inmates and outsiders, such as audio and video stream­
`ing applications, conferencing applications, and secure social
`network media storage. One or more of the components
`within the third party providers (104) may alternatively be
`located within the controlled facility (100) or the outside
`facility (102).
`In one or more embodiments of the invention, the media
`server (122) is a computing system or group of computing
`system with functionality to provide network application ser­
`vices to facilitate communication between an inmate and an
`outsider, and to facilitate access to a secure social network.
`Such services include, but are not limited to, VoIP services,
`video conferencing services, and media streaming services.
`In one or more embodiments of the invention, the web
`server (124) is a computing system or group of computing
`system with functionality to provide an interface to access
`and interact with webpages and other network application
`services. In one or more embodiments of the invention, the
`web server (124) is a type of media server (122).
`In one or more embodiments of the invention, the data­
`center (126) is a computing system or group of computing
`system with functionality to provide an interface to access
`and interact with data stored on one or more data servers (not
`shown). In one or more embodiments of the invention, the
`datacenter (126) is a type of media server (122).
`In one or more embodiments of the invention, the outsider
`computing device (106) is a computing device with function­
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 8,917,848 B2
`
`6
`ality to execute the outsider application (128). In one or more
`embodiments of the invention, the outsider computing device
`(106) is a mobile computing device (e.g., a smartphone, a
`laptop, a tablet, etc.). Further detail about the outsider com­
`puting device (106) is provided in FIG. 6.
`In one or more embodiments of the invention, the outsider
`application (128) is a process or group of processes (in soft­
`ware, firmware, hardware, or combination thereof) with func­
`tionality to enable communication between an outsider and
`an inmate. Specifically, the outsider application (128) may be
`used to send or receive text messages and/or initiate orreceive
`voice or video calls. In one or more embodiments of the
`invention, the outsider application (128) also enables an out­
`sider to access a secure social network. Specifically, the out­
`sider application (128) may be used to upload media to, or
`view media from, a secure social network account of the
`outsider, an inmate, other secure social network member.
`FIG. 2 shows a controlled facility in accordance with one or
`more embodiments of the invention. As shown in FIG. 2, the
`controlled facility (200) may include a visitor kiosk (202), a
`booking kiosk (204), an administrator computing device
`(206), an inmate kiosk (208), an inmate phone (210), an
`inmate computing device (212), and a local server (214). The
`inmate computing device (212) and the local server (214) are
`communicatively coupled to the communications network
`(216). The administrator computing device (206) includes an
`administrator application (218). The inmate computing
`device (212) includes an inmate application (220).
`In one or more embodiments of the invention, the visitor
`kiosk (202) is a computing system with functionality to facili­
`tate communication between an inmate and a visitor. Specifi­
`cally, the visitor kiosk (202) may be a combination of com­
`puting hardware and software used by a visitor to make and
`receive voice and video calls to/from an inmate residing in the
`same controlled facility (200) or another controlled facility
`(not shown). The visitor kiosk (202) may also be used to
`schedule a voice or video call with an inmate for a future date.
`Further, the visitor kiosk (202) may also include the function­
`ality to exchange media (e.g., photos, videos, and audio) with
`an inmate residing in the controlled facility (200). The visitor
`kiosk (202) may include functionality to generate suchmedia,
`such as a camera, microphone, keyboard, and software to
`record or otherwise create media to send to an inmate. Such
`media may be subject to review before being delivered.
`In one or more embodiments of the invention, a visitor
`wanting to use a visitor kiosk (202) may be required to par­
`ticipate in an authentication process to verify the identity of
`the visitor. The authentication process may include creating
`an identity data item and verified data for storage and later
`comparison. The verified data used for authentication may be
`a username and password combination and/or biometric
`information about the visitor.
`In one or more embodiments of the invention, the visitor
`kiosk (202) includes functionality to access a secure social
`network. Specifically, the visitor kiosk (202) may be used by
`a visitor to create and manage a secure social network
`account. The visitor kiosk (202) may also be used by a visitor
`to upload digital media to the visitor’s secure social network
`account or the account of another secure social network mem­
`ber. The visitor kiosk (202) may further be used to view
`digital media uploaded to the visitor’s social network account
`or the account of another secure social network member.
`In one or more embodiments of the invention, the visitor
`kiosk (202) includes functionality to manage a commissary
`account for one or more inmates. Specifically, a visitor may
`use a visitor kiosk (202) to add money to the commissary
`account of an inmate in the controlled facility (200), view a
`
`0015
`
`

`

`7
`transaction history of the commissary account, transfer funds
`between commissary accounts, and/or remove funds from a
`commissary account. Further detail about the visitor kiosk
`(202) is provided in FIG. 5A and FIG. 5B.
`In one or more embodiments of the invention, the booking
`kiosk (204) is a computing system with functionality to aid
`administrators in admitting an inmate into a controlled facil­
`ity (e.g., controlled facility (200)). Specifically, the booking
`kiosk (204) may include functionality to create or update an
`inmate identity data item. Specifically, the booking kiosk
`(204) may be used to obtain verified data (e.g., passwords,
`biometric data, etc.) and save the verification data in one or
`more identity data items for the inmate. The verified data may
`then be used to authenticate the inmate (e.g., to access the
`communications network (216), etc.). In one or more embodi­
`ments of the invention, the booking kiosk may also be used to
`associate one or more restrictions with the inmate via the
`inmate’s identity data item.
`In one or more embodiments of the invention, the booking
`kiosk (204) includes functionality to input contact informa­
`tion for visitors, outsiders, administrators, or other inmates
`with whom the inmate wants to communicate. Such contact
`information may then be associated with the inmate’s identity
`data item, and may be used to initiate a voice or video call, or
`otherwise transmit media to visitors, outsiders, or other
`inmates. Further, in one or more embodiments of the inven­
`tion, the contact information may be retrieved from an
`inmate’s mobile computing device (e.g., cell phone, smart
`phone, etc.) or a local or remote data storage device (e.g., a
`flash drive, a webmail account, etc.). The contact information
`may be retrieved using a wired or wireless connection
`between the booking kiosk and the inmate’s mobile comput­
`ing device and/or the data storage device. The contact infor­
`mation may be subject to review before the inmate is permit­
`ted to contact the visitor, outsider, administrator, or other
`inmate.
`In one or more embodiments of the invention, the booking
`kiosk (204) includes functionality to prepare a mobile com­
`puting device for use by the inmate within the controlled
`facility (200). Specifically, a controlled facility (200) may
`allow inmates the use of computing devices while in or sub­
`ject to the controlled

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket