throbber

`
`
`
`(i9) United States
`(i2) Patent A pplication Publication
`Torgersrud et al.
`
`US 20140267547A1
`
`(io) Pub. No.: US 2014/0267547 Al
`Sep. 18,2014
`(43) Pub. Date:
`
`(54) HANDHELD VIDEO VISITATION
`
`(71) Applicant: Telmate, LLC, San Francisco, CA (US)
`
`(72)
`
`Inventors: Richard Torgersrud, San Francisco, CA
`(US); Kevin O’Neil, Parma, ID (US)
`
`(73) Assignee: TELMATE, LLC, San Francisco, CA
`(US)
`
`(21) Appl.No.: 14/216,993
`
`(22) Filed:
`
`Mar. 17, 2014
`
`Related U.S. Application Data
`(60) Provisional application No. 61/801,861, filed on Mar.
`15, 2013.
`
`Publication Classification
`
`(51)
`
`Int.Cl.
`H 04W 12/08
`H04L 29/06
`H04N7/14
`
`(2006.01)
`(2006.01)
`(2006.01)
`
`(52) U.S. Cl.
`CPC ...............H 04W 12/08 (2013.01); H04N 7/141
`(2013.01); H04L 63/102 (2013.01)
`USPC .......................................................... 348/14.02
`
`(57)
`
`ABSTRACT
`
`An inmate mobile device for communicating with an outsider
`mobile device is provided. An identity data item, of the
`device, includes an inmate identifier of an inmate user of the
`inmate mobile device, a verified data and a restrictions reposi­
`tory. Also included is a media capture module configured to
`obtain an initial verification data from the inmate user of the
`inmate mobile device, and an outsider client application con­
`figured to receive the initial verification data from the media
`capture module, determine that the inmate verification data
`and the inmate verified data match, generate a connection
`request targeting the outsider mobile device. The connection
`request includes the inmate identifier of the inmate user and
`an outsider identifier of an outsider user of the outsider mobile
`device. The inmate application is also further configured to
`send the connection request to a server system.
`
`C o m m u n ic a tio n
`S e r v e r S y s te m
`1 2 0
`
`O u ts id e r M o b ile
`D e v ic e
`1 2 2
`
`GTL 1010
`PGR of U.S. Pat. No. 8,929,525
`
`0001
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 1 of 12
`
`US 2014/0267547 A l
`
`122
`
`Device
`
`Outsider Mobile
`
`FIG. 1
`
`120
`
`Server System
`Communication
`
`100
`
`Controlled Facility
`
`0002
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 2 of 12
`
`US 2014/0267547 A l
`
`FIG. 2
`
`120
`
`Communication Server System
`
`0003
`
`

`

`Patent Application Publication
`
`Sep. 18,2014 Sheet 3 of 12
`
`US 2014/0267547 Al
`
`Kiosk
`300
`
`/
`
`
`
`Camera
`
`Display
`304
`
`0004
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 4 of 12
`
`US 2014/0267547 Al
`
`Computing
`System
`400
`
`FIG, 4
`
`0005
`
`

`

`Patent Application Publication
`
`Sep. 18,2014 Sheet 5 of 12
`
`US 2014/0267547 Al
`
`Mobile Device
`500
`
`FIG. 5
`
`0006
`
`

`

`Patent Application Publication
`
`Sep. 18,2014 Sheet 6 of 12
`
`US 2014/0267547 Al
`
`FIG. 6
`
`0007
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 7 of 12
`
`US 2014/0267547 Al
`
`FIG. 7
`
`0008
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 8 of 12
`
`US 2014/0267547 Al
`
`FIG. 8
`
`0009
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 9 of 12
`
`US 2014/0267547 A l
`
`FIG. 9
`
`SteD 904
`
`Obtain target inmate
`
`SteD 902
`
`Authenticate outsider
`
`connection
`
`outsider to initiate
`
`START
`
`0010
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 10 of 12
`
`US 2014/0267547 Al
`
`FIG. IO
`
`0011
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 11 of 12
`
`US 2014/0267547 Al
`
`FIG. 11
`
`0012
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 12 of 12
`
`US 2014/0267547 Al
`
`FIG. 12
`
`0013
`
`

`

`US 2014/0267547 Al
`
`1
`
`Sep. 18,2014
`
`HANDHELD VIDEO VISITATION
`
`CROSS-REFERENCE TO RELATED
`APPLICATIONS
`[0001] This application hereby claims the benefit of prior­
`ity ofU.S. Provisional Patent Application Ser. No. 61/801,
`861, filed on Mar. 15, 2013, entitled “Handheld Video Visi­
`tation,” and is herein incorporated by reference.
`
`BACKGROUND
`[0002] Controlled facilities, such as a jail, prison, detention
`facility, secured hospital, or addiction treatment facility,
`house laige populations of individuals in confinement, which
`presents unique administrative challenges. In such detention
`environments, detained individuals, such as inmates, prison­
`ers, offenders, convicts, military personnel, patients, govern­
`ment cleared personnel, or other detainees, frequently desire
`to communicate with individuals outside the detention envi­
`ronment such as friends or family members.
`
`BRIEF DESCRIPTION OF DRAWINGS
`[0003] FIG. 1 shows a system in accordance with one or
`more embodiments of the invention.
`[0004] FIG. 2 shows a diagram of a server system in accor­
`dance with one or more embodiments of the invention.
`[0005] FIG. 3 shows a diagram of a kiosk in accordance
`with one or more embodiments of the invention.
`[0006] FIG. 4 shows a computer system in accordance with
`one or more embodiments of the invention.
`[0007] FIG. 5 shows a mobile device in accordance with
`one or more embodiments of the invention.
`[0008] FIG. 6 shows a flowchart of a method for connecting
`a communication in accordance with one or more embodi­
`ments of the invention.
`[0009] FIG. 7 shows a flowchart of a method for authenti­
`cating an individual in accordance with one or more embodi­
`ments of the invention.
`[0010] FIG. 8 shows a flowchart of a method for an inmate
`placing an outgoing communication in accordance with one
`or more embodiments of the invention.
`[0011] FIG. 9 shows a flowchart of a method for a visitor or
`outsider placing an incoming call in accordance with one or
`more embodiments of the invention.
`[0012] FIG. 10 shows a flowchart of a method for continu­
`ous authentication in accordance with one or more embodi­
`ments of the invention.
`[0013] FIG. 11 shows a flowchart of a method for saving
`communications in accordance with one or more embodi­
`ments of the invention.
`[0014] FIG. 12 shows a flowchart of a method for setting a
`schedule in accordance with one or more embodiments of the
`invention.
`
`DETAILED DESCRIPTION
`[0015] Specific embodiments of the invention will now be
`described in detail with reference to the accompanying fig­
`ures. In the following detailed description of embodiments of
`the invention, numerous specific details are set forth in order
`to provide a more thorough understanding of the invention.
`However, it will be apparent to one of ordinary skill in the art
`that the invention may be practiced without these specific
`
`details. In other instances, well-known features have not been
`described in detail to avoid unnecessarily complicating the
`description.
`[0016]
`In general, embodiments of the invention relate to
`handheld video visitation for inmates.
`[0017] FIG. 1 shows a diagram of a system in accordance
`with one or more embodiments of the invention. As shown in
`FIG. 1, the system includes a controlled facility (100), two
`wireless signal antennas (wireless signal antenna (102) and
`wireless signal antenna (118)), an inmate mobile device
`(104), a signal blocking device (106), a visitor kiosk (108), an
`administrator application (110), a local server (112), an
`inmate kiosk (114), a communications network (116), a com­
`munication server system (120) and outsider mobile device
`(122).
`In one or more embodiments of the invention, a
`[0018]
`controlled facility (100) is an access-restricted location in
`which an inmate resides. Examples of controlled facilities
`(e.g., controlled facility (100)) include, but are not limited to,
`detention environments (e.g., jails, prisons, etc.), immigra­
`tion detention centers, military centers, government secure
`sites, law enforcement holding structures, and psychiatric
`hospitals.
`[0019]
`In one or more embodiments of the invention, an
`inmate is a resident of a controlled facility (100) and is subj ect
`to one or more restrictions, primarily to his or her freedom or
`rights. Such restrictions may be part of a court-imposed sen­
`tence on an inmate, while others may be specific to the con­
`trolled facility (100) in which the inmate resides. Restrictions
`may include limitations on an inmate’s physical movement
`(i.e., physical restrictions) and limitations on the inmate’s
`ability to communicate (i.e., communication restrictions).
`Communication restrictions include inmate use restrictions,
`inmate target restrictions, and device use restrictions.
`[0020]
`In one or more embodiments of the invention,
`inmate use restrictions are limitations on an inmate’s general
`ability to communicate with visitors and/or outsiders. Inmate
`use restrictions may include, for example, periods of time in
`which an inmate is not allowed to communicate with outsid­
`ers or visitors (e.g., between 10 PM and 8 AM, during an
`imposed one-week punitive period, etc.) and limitations
`based on lack of funds (e.g., insufficient commissary account
`balance to initiate a communication).
`[0021]
`In one or more embodiments of the invention,
`inmate target restrictions are limitations on the target or
`source of a communication with the inmate. Inmate taiget
`restrictions may be specific outsiders or visitors with whom
`the inmate is not allowed to communicate (e.g., the victim of
`a crime perpetrated by the inmate, etc.). Inmate taiget restric­
`tions may also include types of people with whom the inmate
`is not allowed contact (e.g., outsiders who are ex-cons,
`minors under the age of 18, etc.).
`[0022]
`In one or more embodiments of the invention,
`device use restrictions are restrictions based on the condition
`or state of the communication device used by the inmate.
`Device use restrictions include, for example, limitations
`based on the location of the inmate’s mobile device, limita­
`tions imposed based on a determination that the device has
`been tampered with, etc.
`[0023]
`In one or more embodiments of the invention, an
`outsider is a person outside the controlled facility (100) who
`may be the source or target of a communication with an
`
`0014
`
`

`

`
`
`
`
`US 2014/0267547 A1
`
`2
`
`Sep. 18,2014
`
`inmate. An outsider who enters the controlled facility (100)
`for the purpose of communicating with an inmate is referred
`to as a visitor.
`[0024]
`In one or more embodiments of the invention, wire­
`less signal antenna (102) and/or wireless signal antenna (118)
`are antennas used to propagate wireless signals. The wireless
`signals may be of any strength and type now known or later
`developed.
`[0025]
`In one or more embodiments of the invention, the
`inmate mobile device (104) is a device with functionality to
`send and receive audio communications between an inmate
`and an outsider or visitor. For example, inmate mobile device
`(104) may be a computing device such as a smart phone,
`laptop, tablet, or other suitable device. Specifically, the
`inmate mobile device (104) may be used to send or receive
`text messages and/or initiate or receive voice or video calls. In
`one embodiment of the invention, the inmate mobile device
`(104) also enables an inmate to access a secure social net­
`work. Specifically, the inmate mobile device (104) may be
`used to upload media to, or view media from, a secure social
`network account of the inmate or another secure social net­
`work member. In one or more embodiments of the invention,
`inmate mobile device (104) executes an inmate application
`(not shown) that provides the functionality described above.
`[0026]
`In one or more embodiments of the invention, signal
`blocking device (106) is a device that blocks, or severely
`limits wireless signals, such as those from wireless signal
`antenna (102) and wireless signal antenna (118). Signal
`blocking device (106) may block the wireless signals in any
`manner now known or later developed.
`[0027]
`In one or more embodiments of the invention, kiosks
`(e.g., visitor kiosk (108) and/or inmate kiosk (114)) may be
`used by inmates, visitors, or others for communication, enter­
`tainment, and/or any other purpose. Visitor kiosk (108) and/or
`inmate kiosk (114) is a computing system with functionality
`to facilitate communication between an inmate and a visitor
`or outsider. Such communication facilitation may include
`creating a system identity data item or secure social network­
`ing account, adding or importing contact information for
`outsiders with whom the inmate wishes to communicate,
`uploading media (e.g., photos, videos, audio, and text) to, or
`viewing media from, a secure social network, sending or
`receiving messages or other media, acting as an endpoint for
`voice and video communication between an inmate and a
`visitor or outsider, scheduling a communication, and manag­
`ing a commissary account. In one or more embodiments of
`the invention, visitor kiosk (108) is for visitors, while inmate
`kiosk (114) is inmates. Thus, visitor kiosk (108) and inmate
`kiosk (114) may have minor distinctions between them, such
`as increased use restrictions on inmate kiosk (114), and/or
`any other suitable modifications. Alternatively, visitor kiosk
`(108) and inmate kiosk (114) may be identical, except that
`inmate kiosk (114) is located in an area accessible to inmates.
`It will be apparent to one of ordinary skill in the art that visitor
`kiosk (108) and/or inmate kiosk (114) may have many differ­
`ent components and functionalities and, as such, the invention
`should not be limited to the above examples.
`[0028]
`In one or more embodiments of the invention, the
`administrator application (110) is a process or group of pro­
`cesses executing on a computing system with functionality to
`enable an administrator to create, remove, and/or enforce one
`or more restrictions on an inmate. In one embodiment of the
`invention, an administrator is a person associated with the
`controlled facility charged with enforcing one or more restric­
`
`tions. Examples of administrators include, but are not limited
`to, prison guards, orderlies, wardens, prison staff, jailers,
`information technology technicians, system administrators,
`and law enforcement agents. Using the administrator appli­
`cation, an administrator may retrieve or alter the identity data
`item and/or secure social network account of an inmate, visi­
`tor, or outsider. Further, in one or more embodiments of the
`invention, the administrator application (110) provides
`access to communications between inmates at the controlled
`facility (100) and visitors, outsiders, and other inmates. The
`administrator application (110) may also be used to monitor
`current voice or video calls between an inmate and a visitor,
`outsider, or other inmate. In one embodiment of the invention,
`the administrator application (110) may provide heightened
`access (i.e., a level of access greater than that of the inmate,
`visitor, or outsider) to data stored in the secure social net­
`working account.
`[0029] Specifically, the view administrator application
`(110) sees of the timeline will typically include access to all
`data normally hidden from visitor and inmate timelines,
`including all messages, photos (both approved and rejected),
`and a link to all video visitation archives and telephone call
`recordings, all of which are presented on the admin’s view of
`the inmate’s or visitor’s timeline. This view of the timeline is
`a powerful investigator tool, allowing the admin to research
`and review all electronic communications a given person has
`had in relation to an inmate, parolee, or visitor of interest. This
`version of the application also provides real-time notifica­
`tions (using the same push, IM, SMS, and MMS methods
`described above) of requests for visitation. Such notifications
`will typically contain the current results of the authorization
`checks described above. Using this information, the admin
`may approve, deny, or cancel a previously (automatically or
`human-) approved visitation request directly from within the
`application. In the case where the visitor’s authorization
`check has indicated outstanding warrants (for arrest, as a
`person-of-interest in a criminal investigation, or other rea­
`son), the admin may elect to authorize said visitation request,
`and arrange with law enforcement officials to track the visitor
`using any GPS or other tracking information available on the
`device the visitor is using for the video visitation, or may
`modify the visitation, changing it to a request by the detainee
`for an in-person or on-site visit, or perhaps even a surprise
`release for medical reasons or good behavior, which would
`aid law-enforcement officials in apprehending the visitor with
`outstanding warrants, by encouraging the visitor to show up
`at the secure facility to collect the detainee.
`[0030]
`In one or more embodiments of the invention, the
`local server (112) is a computer system or group of computers
`systems located within the controlled facility (100) that facil­
`ity communication between inmates and visitors, outsiders,
`and/or other inmates. Specifically, the local server (112) may
`implement the software necessary to host voice and video
`calls between and among the visitor kiosk (108), the inmate
`kiosk (114), and a outsider mobile device (122). The local
`server (112) may also include functionality to enforce com­
`munication restrictions associated with the inmates using the
`inmate kiosk (114) or inmate mobile device (104). Alterna­
`tively, the local server (112) may merely provide access to
`other systems capable of hosting the communication software
`and data storage (e.g., located within an offsite facility or a
`third party provider). Further, in one embodiment of the
`invention, the local server (112) includes functionality to
`regulate inmate access to a secure social network.
`
`0015
`
`

`

`US 2014/0267547 Al
`
`3
`
`Sep. 18,2014
`
`In one or more embodiments of the invention, the
`[0031]
`elements within the controlled facility (100) are communica­
`tively coupled to the communications network (116). In one
`embodiment of the invention, the communications network
`(116) is a collection of computing systems and other hard­
`ware interconnected by communication channels. The com­
`munications network (116) may include networks that are
`exclusively or primarily used for a single type of communi­
`cation, such as a telephone network (e.g., Public Switched
`Telephone Network (PSTN) or Plain Old Telephone System
`(POTS)), and/or networks used for a wide array of commu­
`nication types, such as the Internet through Voice over IP
`(VoIP). Communication channels used by the communica­
`tions network (116) may include, for example, telephone
`lines, networking cables, wireless signals, radio waves, etc.
`Fees chaiged and payments received by the provider(s) of the
`communications network (116) may involve multiple parties,
`including a service provider, the management of the con­
`trolled facility (100), and provider(s) of the communications
`network (116). In one ormore embodiments of the invention,
`fees may be split between multiple parties based on the terms
`of underlying agreements or contracts between the parties.
`Further, rebates, reimbursements, and/or refunds may be
`afforded to and paid to the management of the controlled
`facility (100) based on the terms of underlying agreements or
`contracts between the parties. For example, the management
`of the controlled facility (100) may receive a rebate from the
`service provider of the services provided to inmates based on
`such factors as the volume of use, the dollar amount, and/or
`the frequency of use.
`[0032]
`In one or more embodiments of the invention, com­
`munication server system (120) is any server, computer, rack,
`desktop computer, laptop computer, or other suitable com­
`puting device. Communication server system (120) is dis­
`cussed in more detail in FIG. 2.
`[0033]
`In one or more embodiments of the invention, out­
`sider mobile device (122) is any suitable mobile device, such
`as a smart phone, laptop, tablet, etc. Specifically, outsider
`mobile device (122) is able to communicate with inmate
`mobile device (104), authenticate the visitor, and/or any other
`functionality for communicating with an inmate. Outsider
`mobile device (122) may execute a visitor application that
`provides the functionality discussed above.
`[0034] Optionally, the system of FIG. 1 may include an
`application for victims of a crime (not shown). The applica­
`tion is intended for use by crime victims and others who may
`feel threatened by a particular inmate (such as judges, jurors,
`police officers, etc.) allows such victims and other individuals
`to subscribe to information about specific incarcerated and
`formerly incarcerated individuals, ideally anonymously, and
`be notified automatically by the application, preferably using
`push notification, of events relating to the incarcerated or
`formerly incarcerated individual. These events may include,
`but are not limited to, parole hearings, trial dates, release
`dates, new arrests, new charges, and anything else in the
`public record that may serve to increase the safety and/or
`peace-of-mind of the anonymous user.
`[0035] For instance, if a formerly incarcerated individual is
`subject to a keep-away restraining order, and the anonymous
`victim chooses, the application may indicate an alert when­
`ever available tracking systems (such as a GPS ankle band or
`a handheld computing device with tracking features enabled,
`such as a mobile phone configured for parolee monitoring)
`indicate the subject of the restraining order has come within a
`
`specified distance of the protected individual. Upon this alert,
`the authorities responsible for the person subject to the
`restraining order may be automatically notified of the viola­
`tion, and/or the protected individual may be given instruc­
`tions on which direction will increase the distance between
`him and the subject bound by the restraining order.
`[0036] FIG. 2 shows communication server system (120) in
`detail, in accordance with one or more embodiments of the
`invention. Communication server system (200) includes
`authentication module (202), media server (204), scheduling
`module (206), identity repository (208), schedule repository
`(210), timeline repository (212), billing module (214), and
`data miner (216).
`[0037]
`In one or more embodiments of the invention,
`authentication module (202) authenticates/verifies inmates,
`visitors, outsiders, and/or anyone communicating using this
`invention. Specifically, the authentication may take may dif­
`ferent forms including voice, picture/video, passwords, fin­
`gerprints, and/or any other method of verifying identities
`and/or authenticating individuals. Authentication module
`(202) may utilize a voice ID audio clip that was previously
`recorded by the inmate. The pre-recorded clip can be
`recorded under the supervision of administrative staff, and
`may be, for example, a recording of an inmate stating their
`name or another short phrase. When authentication is needed,
`the inmate is requested to speak the pre-recorded phrase.
`After speaking the phrase and being authenticated, the inmate
`may log into the system. The authentication module (202)
`records the phrase spoken by the inmate, and compares a
`digital signature of the audio to the pre-recorded audio clip.
`The pre-recorded clips may be created and stored locally at
`the kiosk or mobile device, or may be created by another
`mechanism and stored at, for example, a database. Accord­
`ingly, the comparison may be made by software on the kiosk
`or at the processing center. If the recorded audio matches the
`prerecorded audio clip, the inmate is granted access.
`[0038]
`In one or more embodiments of the invention,
`authentication module (202) is able to use facial verification
`either separately or in combination with one or more of the
`other verification systems, including Personal Identification
`Number (PIN) verification and the voice verification. For
`facial verification, the inmate may line up their eyes with the
`eye level marks displayed on the kiosk or mobile device. This
`ensures that an appropriate image is captured for verification.
`[0039] As with voice verification, facial verification pro­
`cessing may be performed locally or remotely. In either case,
`the facial verification processing includes comparing an
`image captured by a camera with a pre-stored image of the
`inmate. Authentication module (202) may use facial “land­
`marks” generated by mathematical formulas to present a
`score which indicates a likelihood that the captured image
`matches the pre-stored image. If the images match to a suffi­
`cient degree, the verification is approved and the inmate is
`granted access to the system. If the images do not match, the
`system may store the captured image and other usage details
`for review by administration officials.
`[0040]
`In one or more embodiments of the invention, media
`server (204) is a computing system or group of computing
`systems with functionality to provide network application
`services to facilitate communication between an inmate and
`an outsider, and to facilitate access to a secure social network.
`Such services include, but are not limited to, voice-over­
`internet-protocol (VoIP) services, video conferencing ser­
`vices, and media streaming services.
`
`0016
`
`

`

`US 2014/0267547 A1
`
`4
`
`Sep. 18,2014
`
`In one or more embodiments of the invention,
`[0041]
`scheduling module (206) is responsible for scheduling com­
`munications involving inmates. For example, requests for
`scheduled or immediate remote or on-site video visitations
`may be made at or by any kiosk, mobile device, or other
`suitable computing device. Scheduling module (206) handles
`the scheduling in conjunction with authentication module
`(202), discussed above. Once arranged, authorized, and con­
`nected, the audio and video portions of the remote visit are
`handled by and travel through the media server (204).
`[0042]
`In one or more embodiments of the invention, iden­
`tify repository (208) is used to store authentication informa­
`tion created and/or used by authentication module (202).
`[0043]
`In one or more embodiments of the invention,
`schedule repository (210) is used to store scheduling infor­
`mation created and/or used by scheduling module (206).
`[0044]
`In one or more embodiments of the invention, time­
`line repository (212) is a repository for data relating to a social
`networking site associated with this inmate. Timeline reposi­
`tory (212) may not display every item stored on it on a
`timeline of an associated inmate, some items may be rejected
`or withheld based on a variety of factors. In one or more
`embodiments of the invention, timeline repository (212)
`stores, for example, data about a video visitation after the
`conclusion of the visitation. The data stored may include the
`date and start time, duration, and profile photos of the parties
`communicating may be posted to the social networking
`“wall” or- “timeline” for each participant. As secure environ­
`ments rarefy, if ever, permit either visitors or inmates to view
`recordings of past video visitations, even though such visita­
`tions are typically recorded and archived for use by investi­
`gators, the actual video of the visitation is typically not
`included in said timeline. However, during a video visitation,
`both parties may be allowed to engage in instant messaging
`(IM) types of chats. These may be optionally included in the
`parties’ timelines, if permitted by facility rules.
`[0045]
`In one or more embodiments of the invention, time­
`line repository (212) may store electronic text messages and/
`or photos exchanged between detainees and visitors, option­
`ally for a fee. These will typically be entered into a review
`queue, instead of being immediately displayed on the social
`networking timeline. Such messages and/or photos will typi­
`cally need approval by a suitably authorized individual work­
`ing at or on behalf of the secure facility. If and when approved,
`these messages and/or photos may then be displayed on the
`visitor and/or inmate timelines.
`[0046] Additionally, the visitor is provided the means of
`cross-posting photos uploaded to timeline repository (212) to
`common publicly available social networking services, such
`as but not limited to Facebook, Foursquare, and Flickr. These
`photos may be posted only if sufficient funds and permission
`are available to the visitor, and will typically be held in the
`aforementioned review queue before being posted on, even if
`they are immediately posted to the public service such as
`Facebook, Foursquare, or Flickr. As posted there, they may or
`may not have any indication that they were taken or uploaded
`in conjunction with an inmate. As is frequently practiced with
`photos uploaded to such social networking sites, such photos
`will often have geographic coordinates or other data associ­
`ated with them, either by means of a GPS or similar position­
`determining device or service, or by means of manual input,
`or by a combination of both methods (as is practiced in the
`Foursquare service, where the GPS position is used to display
`a list of nearby well-known business locations or other points-
`
`of-interest). Such information will often be of interest and
`value to the inmate, the visitor, and also the facility’s inves­
`tigators.
`In addition to the human-generated content, time­
`[0047]
`line repository (212) may also include automatically gener­
`ated content related to the inmate, such as dates of upcoming
`court appearances, parole hearings, release or parole dates,
`and other such items. These items may be displayed both in
`the timeline as a historical record, and in a separate list that
`highlights upcoming events. Additionally, when any of these
`dates are initially scheduled, that event may be recorded in the
`timeline.
`In one or more embodiments of the invention. In one
`[0048]
`or more embodiments of the invention, the billing module
`(214) is responsible for payments made for or using a mobile
`device. Optionally, the functionality associated with the bill­
`ing module (214) may be located on any other suitable com­
`ponent. Billing module (214) may facilitate an inmate making
`payments from the prisoner’s commissary or communica­
`tions account, or any other account allowed by the prison or
`controlled facility including, but not limited to: checking
`accounts, savings account, credit cards, gift cards, online
`payment accounts, and/or any other account. In one or more
`embodiments of the invention, family or friends of the inmate
`may place funds into a special account strictly for payment of
`fees associated with a mobile device, which the inmate may
`then access for payment of any fees associated with a mobile
`device or the usage of a mobile device.
`[0049]
`In one or more embodiments of the invention, data
`miner (216) is an application or module for use by adminis­
`tration, investigators, and other similar people. Data miner
`(216) comprises functionality for mining data stored on Com­
`munication Server System (120) and is typically used for
`investigating crimes, criminal behavior, rule breaking, safety
`issues, and/or any other reasons. In one or more embodi­
`ments, the functionality described for data miner (216) may
`be associated with a different application or device, such as
`administrator application (110).
`[0050] FIG. 3 shows kiosk (300) in accordance with one or
`more embodiments of the invention. Kiosk (300) includes an
`integrated camera (302) that can be used for video commu­
`nications or for user authentication via facial recognition. The
`kiosk also includes a display (304) that displays images and
`may be able to detect the presence and location of a user’s
`touch within the display area. Display (304) may be, for
`example, a 15-inch capacitive or resistive touch screen dis­
`play. The touch screen serves as the main kiosk interface with
`a user. A telephone handset (306) connected to the kiosk
`includes a speaker (not shown) and a microphone (not
`shown). Handset (306) can be used to issue voice commands
`and provide voice authentication as required, or it can be used
`for voice and video communications, among other things.
`Handset (306) is just one possible embodiment of audio cap­
`ture and playback, as a kiosk user may, for example, instead
`plug in a headphones or headset with an in-line microphone
`using one or more headphone jack (308), or may use a speak­
`erphone (speaker and microphone combined with additional
`audio processing hardware) (not shown). Headphone jack
`(308) may also be located on the side of the kiosk or behind a
`movable panel, which can be locked in a position exposing
`the jacks or in a position blocking them, depending on the
`preferences of the facility. In one or more embodiments of the
`invention, USB port (310) is located behind a movable panel
`and can be used for system diagnostics by technicians or to
`
`0017
`
`

`

`US 2014/0267547 A1
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket