`
`
`
`
`
`(i9) United States
`(12) Patent Application Publication oo) Pub. No.: US 2014/0273929 Al
`Sep. 18,2014
`Torgersrud
`(43) Pub. Date:
`
`US 20140273929A1
`
`(54) METHOD AND SYSTEM FOR FINANCING OF
`INMATE MOBIEE DEVICES
`
`(71) Applicant: TELMATE LLC, San Francisco, CA
`(US)
`
`(52) U.S. Cl.
`CPC .............. H 04M 15/886 (2013.01); H 04W 4/24
`(2013.01)
`USPC ............................................................. 455/406
`
`(72)
`
`Inventor: Richard Torgersrud, San Francisco, CA
`(US)
`
`(57)
`
`ABSTRACT
`
`(73) Assignee: TELMATE LLC, San Francisco, CA
`(US)
`
`(21) Appl.No.: 13/837,150
`
`(22) Filed:
`
`Mar. 15, 2013
`
`Publication Classification
`
`(51)
`
`Int.Cl.
`H 04M 15/00
`H04W4/24
`
`(2006.01)
`(2006.01)
`
`A method for financing a mobile device for an inmate
`involves receiving a plurality of mobile device rules compris
`ing limitations on usage of the mobile device by the inmate
`within a controlled facility, receiving the mobile device, and
`installing, on the mobile device, a mobile application,
`wherein the mobile application conforms the mobile device to
`the plurality of mobile device rules. The method also involves
`receiving a payment for the mobile device, and executing, by
`the mobile device, the mobile application.
`
`0001
`
`GTL 1011
`PGR of U.S. Pat. No. 8,929,525
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 1 of 8
`
`US 2014/0273929 Al
`
`FIG. 1
`
`0002
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 2 of 8
`
`US 2014/0273929 Al
`
`FIG. 2
`
`0003
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 3 of 8
`
`US 2014/0273929 Al
`
`FIG. 3
`
`0004
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 4 of 8
`
`US 2014/0273929 Al
`
`Mobile Computing
`Device
`400
`
`FIG. 4
`
`0005
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 5 of 8
`
`US 2014/0273929 Al
`
`System
`500
`
`FIG. 5
`
`0006
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 6 of 8
`
`US 2014/0273929 Al
`
`FIG. 6
`
`0007
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 7 of 8
`
`US 2014/0273929 Al
`
`Website restrictions, time of use restriction, and target
`restrictions for usage of mobile device
`Step 700
`
`Detainee or
`friend supplies
`currently
`owned device
`Step 705
`
`Detainee
`turns in
`contraband
`device
`Step 710
`
`Detainee
`purchases
`device
`Step 715
`
`Detainee
`rents device
`Sten 720
`
`Rent to own
`program
`Step 725
`
`Configure / Reconfigure device for compatibility with
`facility approved system
`Step 730
`
`Prohibit Use
`Step 740
`
`^-No— c
`u X .
`
`Detainees.
`use of device
`..
`allowed?
`Step 735
`
`x/ _
`>—Yes^
`
`S
`
`Allow use, and
`log / Record the
`use
`Step 745
`
`Update device as necessary during automated periodic
`check
`Step 750
`
`Detainee released
`Step 755
`
`-Device paid for-
`
`-Device not paid for-
`
`Return device to
`unconfigured
`state
`Step 760
`
`FIG. 7
`
`Prepare device
`for next detainee
`Step 765
`
`0008
`
`
`
`Patent Application Publication
`
`Sep. 18, 2014 Sheet 8 of 8
`
`US 2014/0273929 Al
`
`Computing
`System
`800
`
`FIG. 8
`
`0009
`
`
`
`
`
`US 2014/0273929 A1
`
`1
`
`Sep. 18,2014
`
`METHOD AND SYSTEM FOR FINANCING OF
`INMATE MOBIEE DEVICES
`
`BACKGROUND
`[0001] Controlled facilities, such as jails, prisons, secure
`detention environments, detention facilities, secured hospi
`tals, or addiction treatment facilities, house large populations
`of individuals in confinement, which presents unique admin
`istrative challenges. In such detention environments, detained
`individuals, such as prisoners, offenders, convicts, military
`personnel, patients, government cleared personnel, or other
`detainees, frequently desire to communicate with individuals
`outside the detention environment such as friends or family
`members.
`
`SUMMARY OF INVENTION
`In general, in one aspect, the invention relates to a
`[0002]
`method for financing a mobile device for an inmate, compris
`ing: receiving a plurality of mobile device rules comprising
`limitations on usage of the mobile device by the inmate within
`a controlled facility; receiving the mobile device; installing,
`on the mobile device, a mobile application, wherein the
`mobile application conforms the mobile device to the plural
`ity of mobile device rules; receiving a payment for the mobile
`device; and executing, by the mobile device, the mobile appli
`cation.
`In general, in one aspect, the invention relates to a
`[0003]
`non-transitory computer-readable medium (CRM) storing a
`plurality of instructions for financing a mobile device for an
`inmate, the plurality of instructions comprising functionality
`to: receive a plurality of mobile device rules comprising limi
`tations on usage of the mobile device by the inmate within a
`controlled facility; receive the mobile device; install, on the
`mobile device, a mobile application, wherein the mobile
`application conforms the mobile device to the plurality of
`mobile device rules; receive a payment for the mobile device;
`and execute the mobile application.
`[0004]
`In general, in one aspect, the invention relates to a
`system for financing a mobile device for an inmate, compris
`ing: a server, comprising functionality to: receive a plurality
`of mobile device rules comprising limitations on usage of the
`mobile device by the inmate within a controlled facility;
`receive the mobile device; receive a payment for the mobile
`device; the mobile device, comprising functionality to: install
`a mobile application, wherein the mobile application con
`forms the mobile device to the plurality of mobile device
`rules; and execute the mobile application.
`[0005] Other aspects and advantages of the invention will
`be apparent from the following description and the appended
`claims.
`
`BRIEF DESCRIPTION OF DRAWINGS
`[0006] FIG. 1 shows a diagram of a system in accordance
`with one or more embodiments of the invention.
`[0007] FIG. 2 shows a diagram of a controlled facility in
`accordance with one or more embodiments of the invention.
`[0008] FIG. 3 shows a diagram of an outside facility in
`accordance with one or more embodiments of the invention.
`[0009] FIG. 4 shows a diagram of a mobile computing
`device in accordance with one or more embodiments of the
`invention.
`[0010] FIG. 5 shows a diagram of a system in accordance
`with one or more embodiments of the invention.
`
`[0011] FIG. 6 shows a flowchart of a method in accordance
`with one or more embodiments of the invention.
`[0012] FIG. 7 shows an example in accordance with one or
`more embodiments of the invention.
`[0013] FIG. 8 shows a diagram of a computing system in
`accordance with one or more embodiments of the invention.
`
`DETAILED DESCRIPTION
`[0014] Specific embodiments of the invention will now be
`described in detail with reference to the accompanying fig
`ures. Like elements in the various figures are denoted by like
`reference numerals for consistency.
`[0015]
`In the following detailed description of embodi
`ments of the invention, numerous specific details are set forth
`in order to provide a more thorough understanding of the
`invention. However, it will be apparent to one of ordinary skill
`in the art that the invention may be practiced without these
`specific details. In other instances, well-known features have
`not been described in detail to avoid unnecessarily compli
`cating the description.
`[0016]
`In general, embodiments of the invention provide a
`method and system for financing a mobile device for an
`inmate. Specifically, after rules governing the use of mobile
`devices by inmates are received, a mobile device is received,
`and a mobile application is installed on the mobile device
`which conforms the mobile device to the rules. A payment is
`received for the mobile device, and the inmate is able to use
`the mobile device and/or mobile application.
`[0017] Embodiments of the invention may include interac
`tions with a secure social network. In one embodiment of the
`invention, a secure social network is a network application
`that facilitates and secures the exchange or transmission of
`information between two or more parties in which at least one
`of those parties is subject to special security or law enforce
`ment restrictions or otherwise is subject to the controls of a
`controlled facility. Exchanged or transmitted information
`may be member generated, such as a photo or a video mes
`sage, or it may be member-curated, such as a news headline,
`a famous quote, or a sports score.
`[0018] FIG. 1 shows a diagram of a system in accordance
`with one or more embodiments of the invention. As shown in
`FIG. 1, the system includes a controlled facility (100), an
`outside facility (102), third party providers (104), and an
`outsider computing device (106) each communicatively
`coupled to a communications network (108). The controlled
`facility (100) may include, but is not limited to, a kiosk (110),
`an administrator application (112), an inmate phone (114),
`and an inmate computing device (116). The outside facility
`(102) may include an application server (118) and a database
`server (120). The third party providers (104) may include a
`media server (122), a web server (124), and a datacenter
`(126). The outsider computing device (106) may include an
`outsider application (128).
`[0019]
`In one or more embodiments of the invention, a
`controlled facility (100) is an access-restricted location.
`Examples of controlled facilities (e.g., controlled facility
`(100)) include, but are not limited to, detention environments
`(e.g., jails, prisons, etc.), immigration detention centers, mili
`tary centers, government secure sites, law enforcement hold
`ing structures, and psychiatric hospitals.
`[0020]
`In one or more embodiments of the invention, an
`inmate is a person within a controlled facility (100) who is
`subject to one or more restrictions, primarily to his or her
`freedom or rights. Examples of inmates include, but are not
`
`0010
`
`
`
`US 2014/0273929 Al
`
`2
`
`Sep. 18,2014
`
`limited to, prisoners, wards of the state, parolees, employees
`working in a secure office complex, temporary or long-term
`internees, patients, military personnel, uncharged suspects,
`and refugees. Inmate restrictions may be part of a court-
`imposed sentence on an inmate, while others may be specific
`to the controlled facility (100) exerting control over the
`inmate. Restrictions may include limitations on an inmate’s
`physical movement (i.e., physical restrictions) and limita
`tions on the inmate’s ability to communicate (i.e., communi
`cation restrictions). Communication restrictions include
`inmate use restrictions, inmate taiget restrictions, and device
`use restrictions.
`[0021]
`In one or more embodiments of the invention,
`inmate use restrictions are limitations on an inmate’s general
`ability to communicate with visitors and/or outsiders. Inmate
`use restrictions may include, for example, periods of time in
`which an inmate is not allowed to communicate with outsid
`ers or visitors (e.g., between 10 PM and 8 AM, during an
`imposed one-week punitive period, etc.) and limitations
`based on lack of funds (e.g., communication account balance
`to initiate a communication).
`[0022]
`In one or more embodiments of the invention,
`inmate taiget restrictions are limitations on the target or
`source of a communication with the inmate. Inmate target
`restrictions may be specific outsiders or visitors with whom
`the inmate is not allowed to communicate (e.g., the victim of
`a crime perpetrated by the inmate, etc.). Inmate target restric
`tions may also include types of people with whom the inmate
`is not allowed contact (e.g., outsiders who are ex-cons,
`minors under the age of 18, etc.).
`[0023]
`In one or more embodiments of the invention,
`device use restrictions are restrictions based on the condition
`or state of the communication device used by the inmate.
`Device use restrictions include, for example, limitations
`based on the location of the inmate’s mobile device, limita
`tions imposed based on a determination that the device has
`been tampered with, etc.
`[0024]
`In one or more embodiments of the invention, an
`outsider is a person outside the controlled facility (100) who
`may be the source or target of a communication with an
`inmate. An outsider who enters the controlled facility (100)
`for the purpose of communicating with an inmate is referred
`to as a visitor.
`[0025]
`In one or more embodiments of the invention, the
`kiosk (110) is a computing system with functionality to facili
`tate communication between an inmate and a visitor or out
`sider. Such communication facilitation may include creating
`a system identity data item or secure social networking
`account, adding or importing contact information for outsid
`ers with whom the inmate wishes to communicate, uploading
`media (e.g., photos, videos, audio, and text) to, or viewing
`media from, a secure social network, sending or receiving
`messages or other media, acting as an endpoint for voice and
`video communication between an inmate and a visitor or
`outsider, scheduling a communication, and managing a com
`missary account.
`[0026]
`In one or more embodiments of the invention, the
`administrator application (112) is a process or group of pro
`cesses executing on a computing system with functionality to
`enable an administrator to create, remove, and/or enforce one
`or more restrictions on an inmate, device, visitor, and/or out
`sider. In one embodiment of the invention, an administrator is
`a person associated with the controlled facility charged with
`enforcing one or more restrictions. Examples of administra
`
`tors include, but are not limited to, prison guards, orderlies,
`wardens, prison staff, jailers, information technology techni
`cians, system administrators, and law enforcement agents.
`Using the administrator application, an administrator may
`retrieve or alter the identity data item and/or secure social
`network account of an inmate, visitor, or outsider. Further
`detail about the administrator application (112) is provided in
`FIG. 2.
`In one or more embodiments of the invention, the
`[0027]
`inmate phone (114) is a device with functionality to send and
`receive audio communications between an inmate and an
`outsider or visitor. In one embodiment of the invention, the
`inmate phone (114) is a stationary (i.e., non-mobile) device.
`Further, a single inmate phone (114) may be used by more
`than one inmate. Further detail about the inmate phone (114)
`is provided in FIG. 2.
`[0028]
`In one or more embodiments of the invention, the
`inmate computing device (116) is a computing device with
`functionality to enable an inmate to communicate with a
`visitor or outsider. Specifically, the inmate computing device
`(116) may be used to send or receive text messages and/or
`initiate or receive voice or video calls. In one embodiment of
`the invention, the inmate computing device (116) also enables
`an inmate to access a secure social network. Specifically, the
`inmate computing device (116) may be used to upload media
`to, or view media from, a secure social network account of the
`inmate or another secure social network member. In one
`embodiment of the invention, the inmate computing device
`(116) is a mobile computing device (e.g., a smartphone, a
`laptop, a tablet, etc.). Further detail about the inmate comput
`ing device (116) is provided in FIG. 2 and FIG. 4.
`[0029]
`In one or more embodiments of the invention, the
`elements within the controlled facility (100) are communica
`tively coupled to the communications network (108). In one
`embodiment of the invention, the communications network
`(108) is a collection of computing systems and other hard
`ware interconnected by communication channels. The com
`munications network (108) may include networks that are
`exclusively or primarily used for a single type of communi
`cation, such as a telephone network (e.g., Plain Old Tele
`phone System (POTS)), and/or networks used for a wide
`array of communication types, such as the Internet through
`Voice over IP (VoIP). Communication channels used by the
`communications network (108) may include, for example,
`telephone lines, networking cables, wireless signals, radio
`waves, etc. Fees charged and payments received by the pro
`vider^) of the communications network (108) may involve
`multiple parties, including a service provider of the outside
`facility (102), the management of the controlled facility
`(100), and provider(s) of the communications network (108).
`In one or more embodiments of the invention, fees may be
`split between multiple parties based on the terms of underly
`ing agreements or contracts between the parties. Further,
`rebates, reimbursements, and/or refunds may be afforded to
`and paid to the management of the controlled facility (100)
`based on the terms of underlying agreements or contracts
`between the parties. For example, the management of the
`controlled facility (100) may receive a rebate from the service
`provider of the services provided to inmates based on such
`factors as the volume of use, the dollar amount, and/or the
`frequency of use.
`[0030]
`In one or more embodiments of the invention, the
`outside facility (102) is a group of computing systems located
`outside of the controlled facility (100). Specifically, the out
`
`0011
`
`
`
`US 2014/0273929 A1
`
`3
`
`Sep. 18,2014
`
`side facility (102) may house system elements with function
`ality to facilitate communication between inmates and out
`siders, access communication data between inmates and
`outsiders, and enforce one or more restrictions imposed on
`inmates and inmate communications. In one or more embodi
`ments of the invention, the outside facility (102) is connected
`directly to the controlled facility (100) bypassing a generally
`accessible communications network (communications net
`work (108)). One or more of the components within the
`outside facility (102) may alternatively be located within the
`controlled facility (100) or within the third party providers
`(104).
`In one or more embodiments of the invention, the
`[0031]
`application server (118) is a computing system with function
`ality to authenticate an inmate, outsider, administrator,
`reviewer, or investigator for access to system functionality
`(e.g., initiating voice or video calls, sending text messages,
`etc.) or data stored on the database server (120) (e.g., inmate
`identities, communications between inmates and outsiders,
`etc.). The application server may authenticate inmates, out
`siders, administrators, reviewers, and/or investigators using
`passwords, biometric data, digital access codes, and/orphysi-
`cal access devices. Further detail about the application server
`(118) is provided in FIG. 3.
`[0032]
`In one or more embodiments of the invention, the
`database server (120) is a computing system with function
`ality to store identities used to authenticate inmates, outsid
`ers, administrators, reviewers, and/or investigators. Such
`identities may include verified data used to compare to veri
`fication data provided by the inmate, outsider, administrator,
`reviewer, or investigator to authenticate the inmate, outsider,
`administrator, reviewer, or investigator.
`[0033]
`In one or more embodiments of the invention, the
`database server (120) also stores communication data about
`communications between an inmate and an outsider or visitor.
`Such communication data may include, for example, a
`recording of a video call, the length of a voice call, the
`frequency of video calls, sent and received text messages, etc.
`The database server (120) may also store media submitted to
`a secure social network before, during, and/or after the media
`has been reviewed. Further detail about the database server
`(120) is provided in FIG. 3.
`[0034]
`In one or more embodiments of the invention, the
`third party providers (104) are computing systems that pro
`vide network application and data storage services (i.e., cloud
`computing services). Thirdparty providers (104) may include
`service providers used directly by inmates and outsiders, such
`as photo sharing services, general social networking sites,
`and digital music retailers. Third party providers (104) may
`include service providers employed by administrators and for
`use by inmates and outsiders, such as audio and video stream
`ing applications, conferencing applications, and secure social
`network media storage. One or more of the components
`within the third party providers (104) may alternatively be
`located within the controlled facility (100) or the outside
`facility (102).
`[0035]
`In one or more embodiments of the invention, the
`media server (122) is a computing system or group of com
`puting system with functionality to provide network applica
`tion services to facilitate communication between an inmate
`and an outsider, and to facilitate access to a secure social
`network. Such services include, but are not limited to, VoIP
`services, video conferencing services, and media streaming
`services.
`
`In one or more embodiments of the invention, the
`[0036]
`web server (124) is a computing system or group of comput
`ing system with functionality to provide an interface to access
`and interact with webpages and other network application
`services. In one embodiment of the invention, the web server
`(124) is a type of media server (122).
`[0037]
`In one or more embodiments of the invention, the
`datacenter (126) is a computing system or group of comput
`ing system with functionality to provide an interface to access
`and interact with data stored on one or more data servers (not
`shown). In one embodiment of the invention, the datacenter
`(126) is a type of media server (122).
`[0038]
`In one or more embodiments of the invention, the
`outsider computing device (106) is a computing device with
`functionality to execute the outsider application (128). In one
`or more embodiments of the invention, the outsider comput
`ing device (106) is a mobile computing device (e.g., a smart
`phone, a laptop, a tablet, etc.). Further detail about the out
`sider computing device (106) is provided in FIG. 6.
`[0039]
`In one or more embodiments of the invention, the
`outsider application (128) is a process or group of processes
`(in software, firmware, hardware, or combination thereof)
`with functionality to enable communication between an out
`sider and an inmate. Specifically, the outsider application
`(128) may be used to send or receive text messages and/or
`initiate or receive voice or video calls. In one embodiment of
`the invention, the outsider application (128) also enables an
`outsider to access a secure social network. Specifically, the
`outsider application (128) may be used to upload media to, or
`view media from, a secure social network account of the
`outsider, an inmate, other secure social network member.
`[0040] FIG. 2 shows a controlled facility in accordance
`with one or more embodiments of the invention. As shown in
`FIG. 2, the controlled facility (200) may include a visitor
`kiosk (202), a booking kiosk (204), an administrator comput
`ing device (206), an inmate kiosk (208), an inmate phone
`(210), an inmate computing device (212), and a local server
`(214). The inmate computing device (212) and the local
`server (214) are communicatively coupled to the communi
`cations network (216). The administrator computing device
`(206) includes an administrator application (218). The inmate
`computing device (212) includes an inmate application (220).
`[0041]
`In one or more embodiments of the invention, the
`visitor kiosk (202) is a computing system with functionality
`to facilitate communication between an inmate and a visitor.
`Specifically, the visitor kiosk (202) may be a combination of
`computing hardware and software used by a visitor to make
`and receive voice and video calls to/from an inmate residing
`in the same controlled facility (200) or another controlled
`facility (not shown). The visitor kiosk (202) may also be used
`to schedule a voice or video call with an inmate for a future
`date. Further, the visitor kiosk (202) may also include the
`functionality to exchange media (e.g., photos, videos, and
`audio) with an inmate residing in the controlled facility (200).
`The visitor kiosk (202) may include functionality to generate
`such media, such as a camera, microphone, keyboard, and
`software to record or otherwise create media to send to an
`inmate. Such media may be subject to review before being
`delivered.
`[0042]
`In one or more embodiments of the invention, a
`visitor wanting to use a visitor kiosk (202) may be required to
`participate in an authentication process to verify the identity
`of the visitor. The authentication process may include creat
`ing an identity data item and verified data for storage and later
`
`0012
`
`
`
`US 2014/0273929 A1
`
`4
`
`Sep. 18,2014
`
`comparison. The verified data used for authentication may be
`a username and password combination and/or biometric
`information about the visitor.
`[0043]
`In one or more embodiments of the invention, the
`visitor kiosk (202) includes functionality to access a secure
`social network. Specifically, the visitor kiosk (202) may be
`used by a visitor to create and manage a secure social network
`account. The visitor kiosk (202) may also be used by a visitor
`to upload digital media to the visitor’s secure social network
`account or the account of another secure social network mem
`ber. The visitor kiosk (202) may further be used to view
`digital media uploaded to the visitor’s social network account
`or the account of another secure social network member.
`[0044]
`In one or more embodiments of the invention, the
`visitor kiosk (202) includes functionality to manage a com
`missary account and/or communication account for one or
`more inmates. Specifically, a visitor may use a visitor kiosk
`(202) to add money to the commissary account and/or com
`munication account of an inmate in the controlled facility
`(200), view a transaction history of the commissary account
`and/or or communication account, transfer funds between
`commissary accounts and/or or communication accounts,
`and/or remove funds from a commissary account and/or or
`communication account.
`[0045]
`In one or more embodiments of the invention, the
`booking kiosk (204) is a computing system with functionality
`to aid administrators in admitting an inmate into a controlled
`facility (e.g., controlled facility (200)). Specifically, the book
`ing kiosk (204) may include functionality to create or update
`an inmate identity data item. Specifically, the booking kiosk
`(204) may be used to obtain verified data (e.g., passwords,
`biometric data, etc.) and save the verification data in one or
`more identity data items for the inmate. The verified data may
`then be used to authenticate the inmate for access to the
`communications network (216). In one embodiment of the
`invention, the booking kiosk may also be used to associate
`one or more restrictions with the inmate via the inmate’s
`identity data item.
`[0046]
`In one or more embodiments of the invention, the
`booking kiosk (204) includes functionality to input contact
`information for visitors, outsiders, administrators, or other
`inmates with whom the inmate wants to communicate. Such
`contact information may then be associated with the inmate’s
`identity data item, and may be used to initiate a voice or video
`call, or otherwise transmit media to visitors, outsiders, or
`other inmates. Further, in one embodiment of the invention,
`the contact information may be retrieved from an inmate’s
`mobile computing device (e.g., cell phone, smart phone, etc.)
`or a local or remote data storage device (e.g., a flash drive, a
`webmail account, etc.). The contact information may be
`retrieved using a wired or wireless connection between the
`booking kiosk and the inmate’s mobile computing device
`and/or the data storage device. The contact information may
`be subject to review before the inmate is permitted to contact
`the visitor, outsider, administrator, or other inmate.
`[0047]
`In one or more embodiments of the invention, the
`booking kiosk (204) includes functionality to prepare a
`mobile computing device for use by the inmate within the
`controlled facility (200). Specifically, a controlled facility
`(200) may allow inmates the use of computing devices while
`residing in or subject to the controlled facility (200). How
`ever, use of such inmate computing devices may require that
`the computing device is instrumented with software restrict
`
`ing the use of the inmate computing device. The booking
`kiosk (204) may be used to instrument the inmate computing
`device as required.
`[0048]
`In one or more embodiments of the invention, the
`administrator computing device (206) is a computing system
`or group of computing systems with functionality to execute
`the administrator application (218). In one embodiment of the
`invention, the administrator application (218) is a process or
`group of process with functionality to provide access to com
`munications between inmates at the controlled facility (200)
`and visitors, outsiders, administrators, and other inmates. The
`administrator application (218) may also be used to monitor
`current voice or video calls between an inmate and a visitor,
`outsider, administrator, or other inmate.
`[0049]
`In one embodiment of the invention, the administra
`tor application (218) is used to manage an identity data item
`associated with an inmate. Such management may include
`altering the restrictions (device use restrictions, inmate use
`restrictions, and inmate taiget restrictions) applicable to the
`inmate. In one embodiment of the invention, the administra
`tor application (218) is used to access the secure social net
`work account of an inmate, visitor, or outsider. In one
`embodiment of the invention, the administrator application
`(218) may provide heightened access (i.e., a level of access
`greater than that of the inmate, visitor, or outsider) to data
`stored in the secure social networking account.
`[0050]
`In one or more embodiments of the invention, the
`inmate kiosk (208) is a computing system with functionality
`to facilitate communication between an inmate and a visitor
`or outsider. Specifically, the inmate kiosk (208) may be a
`combination of computing hardware and software used by an
`inmate to make and receive voice and video calls to/from a
`visitor, outsider, or another inmate residing in another con
`trolled facility (not shown). The inmate kiosk (208) may also
`be used to schedule a voice or video call with a visitor at a
`future date. Initiating or scheduling a voice or video call may
`include determining whether the currently attempted call or
`the scheduled call are adverse to one or more restrictions (e.g.,
`inmate use restrictions, device use restrictions, and/or inmate
`target restrictions). Further, the inmate kiosk (208) may also
`include the functionality to exchange media (e.g., photos,
`videos, and audio) with a visitor or outsider. The inmate kiosk
`(208) may include functionality to generate such media, such
`as a camera, microphone, keyboard, and software to record or
`otherwise create media to send to a visitor or outsider. Such
`media may be subject to review before being delivered.
`[0051]
`In one or more embodiments of the invention, an
`inmate wanting to use an inmate kiosk (208) may be required
`to participate in an authentication process to verify the iden
`tity of the inmate. The authentication process may include
`providing verification data for comparison to verified data
`previously obtained from the inmate and stored in the inmate
`identity data item. The verified data may be a username and
`password combination and/or biometric information about
`the inmate.
`[0052]
`In one or more embodiments of the invention, the
`inmate kiosk (208) includes functionality to access a secure
`social network. Specifically, the inmate kiosk (208) may be
`used by an inmate to manage a secure social network account.
`The inmate kiosk (208) may also be used by an inmate to
`upload digital media to the inmate’s secure social network
`account or the account of another secure social network mem
`ber. The inmate kiosk (208) may further be used to view
`digital media uploaded to the inmate’s social network
`
`0013
`
`
`
`US 2014/0273929 A1
`
`5
`
`Sep. 18,2014
`
`account or the account of another secure social network mem
`ber. Uploaded media may be subject to review before posting.
`[0053]
`In one or more embodiments of the invention, the
`inmate kiosk (208) includes functionality to manage a com
`missary account for the inmate. Specifically, an inmate may
`use an inmate kiosk (208) to view a transaction history of the
`commissary account and/or to apply commissary funds for
`goods and services consumed or enjoyed by the inmate.
`[0054]
`In o