throbber

`
`
`
`
`
`(i9) United States
`(12) Patent Application Publication oo) Pub. No.: US 2014/0273929 Al
`Sep. 18,2014
`Torgersrud
`(43) Pub. Date:
`
`US 20140273929A1
`
`(54) METHOD AND SYSTEM FOR FINANCING OF
`INMATE MOBIEE DEVICES
`
`(71) Applicant: TELMATE LLC, San Francisco, CA
`(US)
`
`(52) U.S. Cl.
`CPC .............. H 04M 15/886 (2013.01); H 04W 4/24
`(2013.01)
`USPC ............................................................. 455/406
`
`(72)
`
`Inventor: Richard Torgersrud, San Francisco, CA
`(US)
`
`(57)
`
`ABSTRACT
`
`(73) Assignee: TELMATE LLC, San Francisco, CA
`(US)
`
`(21) Appl.No.: 13/837,150
`
`(22) Filed:
`
`Mar. 15, 2013
`
`Publication Classification
`
`(51)
`
`Int.Cl.
`H 04M 15/00
`H04W4/24
`
`(2006.01)
`(2006.01)
`
`A method for financing a mobile device for an inmate
`involves receiving a plurality of mobile device rules compris­
`ing limitations on usage of the mobile device by the inmate
`within a controlled facility, receiving the mobile device, and
`installing, on the mobile device, a mobile application,
`wherein the mobile application conforms the mobile device to
`the plurality of mobile device rules. The method also involves
`receiving a payment for the mobile device, and executing, by
`the mobile device, the mobile application.
`
`0001
`
`GTL 1011
`PGR of U.S. Pat. No. 8,929,525
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 1 of 8
`
`US 2014/0273929 Al
`
`FIG. 1
`
`0002
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 2 of 8
`
`US 2014/0273929 Al
`
`FIG. 2
`
`0003
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 3 of 8
`
`US 2014/0273929 Al
`
`FIG. 3
`
`0004
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 4 of 8
`
`US 2014/0273929 Al
`
`Mobile Computing
`Device
`400
`
`FIG. 4
`
`0005
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 5 of 8
`
`US 2014/0273929 Al
`
`System
`500
`
`FIG. 5
`
`0006
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 6 of 8
`
`US 2014/0273929 Al
`
`FIG. 6
`
`0007
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 7 of 8
`
`US 2014/0273929 Al
`
`Website restrictions, time of use restriction, and target
`restrictions for usage of mobile device
`Step 700
`
`Detainee or
`friend supplies
`currently
`owned device
`Step 705
`
`Detainee
`turns in
`contraband
`device
`Step 710
`
`Detainee
`purchases
`device
`Step 715
`
`Detainee
`rents device
`Sten 720
`
`Rent to own
`program
`Step 725
`
`Configure / Reconfigure device for compatibility with
`facility approved system
`Step 730
`
`Prohibit Use
`Step 740
`
`^-No— c
`u X .
`
`Detainees.
`use of device
`..
`allowed?
`Step 735
`
`x/ _
`>—Yes^
`
`S
`
`Allow use, and
`log / Record the
`use
`Step 745
`
`Update device as necessary during automated periodic
`check
`Step 750
`
`Detainee released
`Step 755
`
`-Device paid for-
`
`-Device not paid for-
`
`Return device to
`unconfigured
`state
`Step 760
`
`FIG. 7
`
`Prepare device
`for next detainee
`Step 765
`
`0008
`
`

`

`Patent Application Publication
`
`Sep. 18, 2014 Sheet 8 of 8
`
`US 2014/0273929 Al
`
`Computing
`System
`800
`
`FIG. 8
`
`0009
`
`

`

`
`
`US 2014/0273929 A1
`
`1
`
`Sep. 18,2014
`
`METHOD AND SYSTEM FOR FINANCING OF
`INMATE MOBIEE DEVICES
`
`BACKGROUND
`[0001] Controlled facilities, such as jails, prisons, secure
`detention environments, detention facilities, secured hospi­
`tals, or addiction treatment facilities, house large populations
`of individuals in confinement, which presents unique admin­
`istrative challenges. In such detention environments, detained
`individuals, such as prisoners, offenders, convicts, military
`personnel, patients, government cleared personnel, or other
`detainees, frequently desire to communicate with individuals
`outside the detention environment such as friends or family
`members.
`
`SUMMARY OF INVENTION
`In general, in one aspect, the invention relates to a
`[0002]
`method for financing a mobile device for an inmate, compris­
`ing: receiving a plurality of mobile device rules comprising
`limitations on usage of the mobile device by the inmate within
`a controlled facility; receiving the mobile device; installing,
`on the mobile device, a mobile application, wherein the
`mobile application conforms the mobile device to the plural­
`ity of mobile device rules; receiving a payment for the mobile
`device; and executing, by the mobile device, the mobile appli­
`cation.
`In general, in one aspect, the invention relates to a
`[0003]
`non-transitory computer-readable medium (CRM) storing a
`plurality of instructions for financing a mobile device for an
`inmate, the plurality of instructions comprising functionality
`to: receive a plurality of mobile device rules comprising limi­
`tations on usage of the mobile device by the inmate within a
`controlled facility; receive the mobile device; install, on the
`mobile device, a mobile application, wherein the mobile
`application conforms the mobile device to the plurality of
`mobile device rules; receive a payment for the mobile device;
`and execute the mobile application.
`[0004]
`In general, in one aspect, the invention relates to a
`system for financing a mobile device for an inmate, compris­
`ing: a server, comprising functionality to: receive a plurality
`of mobile device rules comprising limitations on usage of the
`mobile device by the inmate within a controlled facility;
`receive the mobile device; receive a payment for the mobile
`device; the mobile device, comprising functionality to: install
`a mobile application, wherein the mobile application con­
`forms the mobile device to the plurality of mobile device
`rules; and execute the mobile application.
`[0005] Other aspects and advantages of the invention will
`be apparent from the following description and the appended
`claims.
`
`BRIEF DESCRIPTION OF DRAWINGS
`[0006] FIG. 1 shows a diagram of a system in accordance
`with one or more embodiments of the invention.
`[0007] FIG. 2 shows a diagram of a controlled facility in
`accordance with one or more embodiments of the invention.
`[0008] FIG. 3 shows a diagram of an outside facility in
`accordance with one or more embodiments of the invention.
`[0009] FIG. 4 shows a diagram of a mobile computing
`device in accordance with one or more embodiments of the
`invention.
`[0010] FIG. 5 shows a diagram of a system in accordance
`with one or more embodiments of the invention.
`
`[0011] FIG. 6 shows a flowchart of a method in accordance
`with one or more embodiments of the invention.
`[0012] FIG. 7 shows an example in accordance with one or
`more embodiments of the invention.
`[0013] FIG. 8 shows a diagram of a computing system in
`accordance with one or more embodiments of the invention.
`
`DETAILED DESCRIPTION
`[0014] Specific embodiments of the invention will now be
`described in detail with reference to the accompanying fig­
`ures. Like elements in the various figures are denoted by like
`reference numerals for consistency.
`[0015]
`In the following detailed description of embodi­
`ments of the invention, numerous specific details are set forth
`in order to provide a more thorough understanding of the
`invention. However, it will be apparent to one of ordinary skill
`in the art that the invention may be practiced without these
`specific details. In other instances, well-known features have
`not been described in detail to avoid unnecessarily compli­
`cating the description.
`[0016]
`In general, embodiments of the invention provide a
`method and system for financing a mobile device for an
`inmate. Specifically, after rules governing the use of mobile
`devices by inmates are received, a mobile device is received,
`and a mobile application is installed on the mobile device
`which conforms the mobile device to the rules. A payment is
`received for the mobile device, and the inmate is able to use
`the mobile device and/or mobile application.
`[0017] Embodiments of the invention may include interac­
`tions with a secure social network. In one embodiment of the
`invention, a secure social network is a network application
`that facilitates and secures the exchange or transmission of
`information between two or more parties in which at least one
`of those parties is subject to special security or law enforce­
`ment restrictions or otherwise is subject to the controls of a
`controlled facility. Exchanged or transmitted information
`may be member generated, such as a photo or a video mes­
`sage, or it may be member-curated, such as a news headline,
`a famous quote, or a sports score.
`[0018] FIG. 1 shows a diagram of a system in accordance
`with one or more embodiments of the invention. As shown in
`FIG. 1, the system includes a controlled facility (100), an
`outside facility (102), third party providers (104), and an
`outsider computing device (106) each communicatively
`coupled to a communications network (108). The controlled
`facility (100) may include, but is not limited to, a kiosk (110),
`an administrator application (112), an inmate phone (114),
`and an inmate computing device (116). The outside facility
`(102) may include an application server (118) and a database
`server (120). The third party providers (104) may include a
`media server (122), a web server (124), and a datacenter
`(126). The outsider computing device (106) may include an
`outsider application (128).
`[0019]
`In one or more embodiments of the invention, a
`controlled facility (100) is an access-restricted location.
`Examples of controlled facilities (e.g., controlled facility
`(100)) include, but are not limited to, detention environments
`(e.g., jails, prisons, etc.), immigration detention centers, mili­
`tary centers, government secure sites, law enforcement hold­
`ing structures, and psychiatric hospitals.
`[0020]
`In one or more embodiments of the invention, an
`inmate is a person within a controlled facility (100) who is
`subject to one or more restrictions, primarily to his or her
`freedom or rights. Examples of inmates include, but are not
`
`0010
`
`

`

`US 2014/0273929 Al
`
`2
`
`Sep. 18,2014
`
`limited to, prisoners, wards of the state, parolees, employees
`working in a secure office complex, temporary or long-term
`internees, patients, military personnel, uncharged suspects,
`and refugees. Inmate restrictions may be part of a court-
`imposed sentence on an inmate, while others may be specific
`to the controlled facility (100) exerting control over the
`inmate. Restrictions may include limitations on an inmate’s
`physical movement (i.e., physical restrictions) and limita­
`tions on the inmate’s ability to communicate (i.e., communi­
`cation restrictions). Communication restrictions include
`inmate use restrictions, inmate taiget restrictions, and device
`use restrictions.
`[0021]
`In one or more embodiments of the invention,
`inmate use restrictions are limitations on an inmate’s general
`ability to communicate with visitors and/or outsiders. Inmate
`use restrictions may include, for example, periods of time in
`which an inmate is not allowed to communicate with outsid­
`ers or visitors (e.g., between 10 PM and 8 AM, during an
`imposed one-week punitive period, etc.) and limitations
`based on lack of funds (e.g., communication account balance
`to initiate a communication).
`[0022]
`In one or more embodiments of the invention,
`inmate taiget restrictions are limitations on the target or
`source of a communication with the inmate. Inmate target
`restrictions may be specific outsiders or visitors with whom
`the inmate is not allowed to communicate (e.g., the victim of
`a crime perpetrated by the inmate, etc.). Inmate target restric­
`tions may also include types of people with whom the inmate
`is not allowed contact (e.g., outsiders who are ex-cons,
`minors under the age of 18, etc.).
`[0023]
`In one or more embodiments of the invention,
`device use restrictions are restrictions based on the condition
`or state of the communication device used by the inmate.
`Device use restrictions include, for example, limitations
`based on the location of the inmate’s mobile device, limita­
`tions imposed based on a determination that the device has
`been tampered with, etc.
`[0024]
`In one or more embodiments of the invention, an
`outsider is a person outside the controlled facility (100) who
`may be the source or target of a communication with an
`inmate. An outsider who enters the controlled facility (100)
`for the purpose of communicating with an inmate is referred
`to as a visitor.
`[0025]
`In one or more embodiments of the invention, the
`kiosk (110) is a computing system with functionality to facili­
`tate communication between an inmate and a visitor or out­
`sider. Such communication facilitation may include creating
`a system identity data item or secure social networking
`account, adding or importing contact information for outsid­
`ers with whom the inmate wishes to communicate, uploading
`media (e.g., photos, videos, audio, and text) to, or viewing
`media from, a secure social network, sending or receiving
`messages or other media, acting as an endpoint for voice and
`video communication between an inmate and a visitor or
`outsider, scheduling a communication, and managing a com­
`missary account.
`[0026]
`In one or more embodiments of the invention, the
`administrator application (112) is a process or group of pro­
`cesses executing on a computing system with functionality to
`enable an administrator to create, remove, and/or enforce one
`or more restrictions on an inmate, device, visitor, and/or out­
`sider. In one embodiment of the invention, an administrator is
`a person associated with the controlled facility charged with
`enforcing one or more restrictions. Examples of administra­
`
`tors include, but are not limited to, prison guards, orderlies,
`wardens, prison staff, jailers, information technology techni­
`cians, system administrators, and law enforcement agents.
`Using the administrator application, an administrator may
`retrieve or alter the identity data item and/or secure social
`network account of an inmate, visitor, or outsider. Further
`detail about the administrator application (112) is provided in
`FIG. 2.
`In one or more embodiments of the invention, the
`[0027]
`inmate phone (114) is a device with functionality to send and
`receive audio communications between an inmate and an
`outsider or visitor. In one embodiment of the invention, the
`inmate phone (114) is a stationary (i.e., non-mobile) device.
`Further, a single inmate phone (114) may be used by more
`than one inmate. Further detail about the inmate phone (114)
`is provided in FIG. 2.
`[0028]
`In one or more embodiments of the invention, the
`inmate computing device (116) is a computing device with
`functionality to enable an inmate to communicate with a
`visitor or outsider. Specifically, the inmate computing device
`(116) may be used to send or receive text messages and/or
`initiate or receive voice or video calls. In one embodiment of
`the invention, the inmate computing device (116) also enables
`an inmate to access a secure social network. Specifically, the
`inmate computing device (116) may be used to upload media
`to, or view media from, a secure social network account of the
`inmate or another secure social network member. In one
`embodiment of the invention, the inmate computing device
`(116) is a mobile computing device (e.g., a smartphone, a
`laptop, a tablet, etc.). Further detail about the inmate comput­
`ing device (116) is provided in FIG. 2 and FIG. 4.
`[0029]
`In one or more embodiments of the invention, the
`elements within the controlled facility (100) are communica­
`tively coupled to the communications network (108). In one
`embodiment of the invention, the communications network
`(108) is a collection of computing systems and other hard­
`ware interconnected by communication channels. The com­
`munications network (108) may include networks that are
`exclusively or primarily used for a single type of communi­
`cation, such as a telephone network (e.g., Plain Old Tele­
`phone System (POTS)), and/or networks used for a wide
`array of communication types, such as the Internet through
`Voice over IP (VoIP). Communication channels used by the
`communications network (108) may include, for example,
`telephone lines, networking cables, wireless signals, radio
`waves, etc. Fees charged and payments received by the pro­
`vider^) of the communications network (108) may involve
`multiple parties, including a service provider of the outside
`facility (102), the management of the controlled facility
`(100), and provider(s) of the communications network (108).
`In one or more embodiments of the invention, fees may be
`split between multiple parties based on the terms of underly­
`ing agreements or contracts between the parties. Further,
`rebates, reimbursements, and/or refunds may be afforded to
`and paid to the management of the controlled facility (100)
`based on the terms of underlying agreements or contracts
`between the parties. For example, the management of the
`controlled facility (100) may receive a rebate from the service
`provider of the services provided to inmates based on such
`factors as the volume of use, the dollar amount, and/or the
`frequency of use.
`[0030]
`In one or more embodiments of the invention, the
`outside facility (102) is a group of computing systems located
`outside of the controlled facility (100). Specifically, the out­
`
`0011
`
`

`

`US 2014/0273929 A1
`
`3
`
`Sep. 18,2014
`
`side facility (102) may house system elements with function­
`ality to facilitate communication between inmates and out­
`siders, access communication data between inmates and
`outsiders, and enforce one or more restrictions imposed on
`inmates and inmate communications. In one or more embodi­
`ments of the invention, the outside facility (102) is connected
`directly to the controlled facility (100) bypassing a generally
`accessible communications network (communications net­
`work (108)). One or more of the components within the
`outside facility (102) may alternatively be located within the
`controlled facility (100) or within the third party providers
`(104).
`In one or more embodiments of the invention, the
`[0031]
`application server (118) is a computing system with function­
`ality to authenticate an inmate, outsider, administrator,
`reviewer, or investigator for access to system functionality
`(e.g., initiating voice or video calls, sending text messages,
`etc.) or data stored on the database server (120) (e.g., inmate
`identities, communications between inmates and outsiders,
`etc.). The application server may authenticate inmates, out­
`siders, administrators, reviewers, and/or investigators using
`passwords, biometric data, digital access codes, and/orphysi-
`cal access devices. Further detail about the application server
`(118) is provided in FIG. 3.
`[0032]
`In one or more embodiments of the invention, the
`database server (120) is a computing system with function­
`ality to store identities used to authenticate inmates, outsid­
`ers, administrators, reviewers, and/or investigators. Such
`identities may include verified data used to compare to veri­
`fication data provided by the inmate, outsider, administrator,
`reviewer, or investigator to authenticate the inmate, outsider,
`administrator, reviewer, or investigator.
`[0033]
`In one or more embodiments of the invention, the
`database server (120) also stores communication data about
`communications between an inmate and an outsider or visitor.
`Such communication data may include, for example, a
`recording of a video call, the length of a voice call, the
`frequency of video calls, sent and received text messages, etc.
`The database server (120) may also store media submitted to
`a secure social network before, during, and/or after the media
`has been reviewed. Further detail about the database server
`(120) is provided in FIG. 3.
`[0034]
`In one or more embodiments of the invention, the
`third party providers (104) are computing systems that pro­
`vide network application and data storage services (i.e., cloud
`computing services). Thirdparty providers (104) may include
`service providers used directly by inmates and outsiders, such
`as photo sharing services, general social networking sites,
`and digital music retailers. Third party providers (104) may
`include service providers employed by administrators and for
`use by inmates and outsiders, such as audio and video stream­
`ing applications, conferencing applications, and secure social
`network media storage. One or more of the components
`within the third party providers (104) may alternatively be
`located within the controlled facility (100) or the outside
`facility (102).
`[0035]
`In one or more embodiments of the invention, the
`media server (122) is a computing system or group of com­
`puting system with functionality to provide network applica­
`tion services to facilitate communication between an inmate
`and an outsider, and to facilitate access to a secure social
`network. Such services include, but are not limited to, VoIP
`services, video conferencing services, and media streaming
`services.
`
`In one or more embodiments of the invention, the
`[0036]
`web server (124) is a computing system or group of comput­
`ing system with functionality to provide an interface to access
`and interact with webpages and other network application
`services. In one embodiment of the invention, the web server
`(124) is a type of media server (122).
`[0037]
`In one or more embodiments of the invention, the
`datacenter (126) is a computing system or group of comput­
`ing system with functionality to provide an interface to access
`and interact with data stored on one or more data servers (not
`shown). In one embodiment of the invention, the datacenter
`(126) is a type of media server (122).
`[0038]
`In one or more embodiments of the invention, the
`outsider computing device (106) is a computing device with
`functionality to execute the outsider application (128). In one
`or more embodiments of the invention, the outsider comput­
`ing device (106) is a mobile computing device (e.g., a smart­
`phone, a laptop, a tablet, etc.). Further detail about the out­
`sider computing device (106) is provided in FIG. 6.
`[0039]
`In one or more embodiments of the invention, the
`outsider application (128) is a process or group of processes
`(in software, firmware, hardware, or combination thereof)
`with functionality to enable communication between an out­
`sider and an inmate. Specifically, the outsider application
`(128) may be used to send or receive text messages and/or
`initiate or receive voice or video calls. In one embodiment of
`the invention, the outsider application (128) also enables an
`outsider to access a secure social network. Specifically, the
`outsider application (128) may be used to upload media to, or
`view media from, a secure social network account of the
`outsider, an inmate, other secure social network member.
`[0040] FIG. 2 shows a controlled facility in accordance
`with one or more embodiments of the invention. As shown in
`FIG. 2, the controlled facility (200) may include a visitor
`kiosk (202), a booking kiosk (204), an administrator comput­
`ing device (206), an inmate kiosk (208), an inmate phone
`(210), an inmate computing device (212), and a local server
`(214). The inmate computing device (212) and the local
`server (214) are communicatively coupled to the communi­
`cations network (216). The administrator computing device
`(206) includes an administrator application (218). The inmate
`computing device (212) includes an inmate application (220).
`[0041]
`In one or more embodiments of the invention, the
`visitor kiosk (202) is a computing system with functionality
`to facilitate communication between an inmate and a visitor.
`Specifically, the visitor kiosk (202) may be a combination of
`computing hardware and software used by a visitor to make
`and receive voice and video calls to/from an inmate residing
`in the same controlled facility (200) or another controlled
`facility (not shown). The visitor kiosk (202) may also be used
`to schedule a voice or video call with an inmate for a future
`date. Further, the visitor kiosk (202) may also include the
`functionality to exchange media (e.g., photos, videos, and
`audio) with an inmate residing in the controlled facility (200).
`The visitor kiosk (202) may include functionality to generate
`such media, such as a camera, microphone, keyboard, and
`software to record or otherwise create media to send to an
`inmate. Such media may be subject to review before being
`delivered.
`[0042]
`In one or more embodiments of the invention, a
`visitor wanting to use a visitor kiosk (202) may be required to
`participate in an authentication process to verify the identity
`of the visitor. The authentication process may include creat­
`ing an identity data item and verified data for storage and later
`
`0012
`
`

`

`US 2014/0273929 A1
`
`4
`
`Sep. 18,2014
`
`comparison. The verified data used for authentication may be
`a username and password combination and/or biometric
`information about the visitor.
`[0043]
`In one or more embodiments of the invention, the
`visitor kiosk (202) includes functionality to access a secure
`social network. Specifically, the visitor kiosk (202) may be
`used by a visitor to create and manage a secure social network
`account. The visitor kiosk (202) may also be used by a visitor
`to upload digital media to the visitor’s secure social network
`account or the account of another secure social network mem­
`ber. The visitor kiosk (202) may further be used to view
`digital media uploaded to the visitor’s social network account
`or the account of another secure social network member.
`[0044]
`In one or more embodiments of the invention, the
`visitor kiosk (202) includes functionality to manage a com­
`missary account and/or communication account for one or
`more inmates. Specifically, a visitor may use a visitor kiosk
`(202) to add money to the commissary account and/or com­
`munication account of an inmate in the controlled facility
`(200), view a transaction history of the commissary account
`and/or or communication account, transfer funds between
`commissary accounts and/or or communication accounts,
`and/or remove funds from a commissary account and/or or
`communication account.
`[0045]
`In one or more embodiments of the invention, the
`booking kiosk (204) is a computing system with functionality
`to aid administrators in admitting an inmate into a controlled
`facility (e.g., controlled facility (200)). Specifically, the book­
`ing kiosk (204) may include functionality to create or update
`an inmate identity data item. Specifically, the booking kiosk
`(204) may be used to obtain verified data (e.g., passwords,
`biometric data, etc.) and save the verification data in one or
`more identity data items for the inmate. The verified data may
`then be used to authenticate the inmate for access to the
`communications network (216). In one embodiment of the
`invention, the booking kiosk may also be used to associate
`one or more restrictions with the inmate via the inmate’s
`identity data item.
`[0046]
`In one or more embodiments of the invention, the
`booking kiosk (204) includes functionality to input contact
`information for visitors, outsiders, administrators, or other
`inmates with whom the inmate wants to communicate. Such
`contact information may then be associated with the inmate’s
`identity data item, and may be used to initiate a voice or video
`call, or otherwise transmit media to visitors, outsiders, or
`other inmates. Further, in one embodiment of the invention,
`the contact information may be retrieved from an inmate’s
`mobile computing device (e.g., cell phone, smart phone, etc.)
`or a local or remote data storage device (e.g., a flash drive, a
`webmail account, etc.). The contact information may be
`retrieved using a wired or wireless connection between the
`booking kiosk and the inmate’s mobile computing device
`and/or the data storage device. The contact information may
`be subject to review before the inmate is permitted to contact
`the visitor, outsider, administrator, or other inmate.
`[0047]
`In one or more embodiments of the invention, the
`booking kiosk (204) includes functionality to prepare a
`mobile computing device for use by the inmate within the
`controlled facility (200). Specifically, a controlled facility
`(200) may allow inmates the use of computing devices while
`residing in or subject to the controlled facility (200). How­
`ever, use of such inmate computing devices may require that
`the computing device is instrumented with software restrict­
`
`ing the use of the inmate computing device. The booking
`kiosk (204) may be used to instrument the inmate computing
`device as required.
`[0048]
`In one or more embodiments of the invention, the
`administrator computing device (206) is a computing system
`or group of computing systems with functionality to execute
`the administrator application (218). In one embodiment of the
`invention, the administrator application (218) is a process or
`group of process with functionality to provide access to com­
`munications between inmates at the controlled facility (200)
`and visitors, outsiders, administrators, and other inmates. The
`administrator application (218) may also be used to monitor
`current voice or video calls between an inmate and a visitor,
`outsider, administrator, or other inmate.
`[0049]
`In one embodiment of the invention, the administra­
`tor application (218) is used to manage an identity data item
`associated with an inmate. Such management may include
`altering the restrictions (device use restrictions, inmate use
`restrictions, and inmate taiget restrictions) applicable to the
`inmate. In one embodiment of the invention, the administra­
`tor application (218) is used to access the secure social net­
`work account of an inmate, visitor, or outsider. In one
`embodiment of the invention, the administrator application
`(218) may provide heightened access (i.e., a level of access
`greater than that of the inmate, visitor, or outsider) to data
`stored in the secure social networking account.
`[0050]
`In one or more embodiments of the invention, the
`inmate kiosk (208) is a computing system with functionality
`to facilitate communication between an inmate and a visitor
`or outsider. Specifically, the inmate kiosk (208) may be a
`combination of computing hardware and software used by an
`inmate to make and receive voice and video calls to/from a
`visitor, outsider, or another inmate residing in another con­
`trolled facility (not shown). The inmate kiosk (208) may also
`be used to schedule a voice or video call with a visitor at a
`future date. Initiating or scheduling a voice or video call may
`include determining whether the currently attempted call or
`the scheduled call are adverse to one or more restrictions (e.g.,
`inmate use restrictions, device use restrictions, and/or inmate
`target restrictions). Further, the inmate kiosk (208) may also
`include the functionality to exchange media (e.g., photos,
`videos, and audio) with a visitor or outsider. The inmate kiosk
`(208) may include functionality to generate such media, such
`as a camera, microphone, keyboard, and software to record or
`otherwise create media to send to a visitor or outsider. Such
`media may be subject to review before being delivered.
`[0051]
`In one or more embodiments of the invention, an
`inmate wanting to use an inmate kiosk (208) may be required
`to participate in an authentication process to verify the iden­
`tity of the inmate. The authentication process may include
`providing verification data for comparison to verified data
`previously obtained from the inmate and stored in the inmate
`identity data item. The verified data may be a username and
`password combination and/or biometric information about
`the inmate.
`[0052]
`In one or more embodiments of the invention, the
`inmate kiosk (208) includes functionality to access a secure
`social network. Specifically, the inmate kiosk (208) may be
`used by an inmate to manage a secure social network account.
`The inmate kiosk (208) may also be used by an inmate to
`upload digital media to the inmate’s secure social network
`account or the account of another secure social network mem­
`ber. The inmate kiosk (208) may further be used to view
`digital media uploaded to the inmate’s social network
`
`0013
`
`

`

`US 2014/0273929 A1
`
`5
`
`Sep. 18,2014
`
`account or the account of another secure social network mem­
`ber. Uploaded media may be subject to review before posting.
`[0053]
`In one or more embodiments of the invention, the
`inmate kiosk (208) includes functionality to manage a com­
`missary account for the inmate. Specifically, an inmate may
`use an inmate kiosk (208) to view a transaction history of the
`commissary account and/or to apply commissary funds for
`goods and services consumed or enjoyed by the inmate.
`[0054]
`In o

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket