US20080201158A1 - System and method for visitation management in a controlled-access environment - Google Patents
System and method for visitation management in a controlled-access environment Download PDFInfo
- Publication number
- US20080201158A1 US20080201158A1 US11/819,834 US81983407A US2008201158A1 US 20080201158 A1 US20080201158 A1 US 20080201158A1 US 81983407 A US81983407 A US 81983407A US 2008201158 A1 US2008201158 A1 US 2008201158A1
- Authority
- US
- United States
- Prior art keywords
- visitation
- party
- session
- visitation session
- controlled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/254—Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42221—Conversation recording systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/28—Databases characterised by their database models, e.g. relational or object models
- G06F16/283—Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/683—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
- G06F16/685—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using automatically derived transcript of audio data, e.g. lyrics
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/60—Information retrieval; Database structures therefor; File system structures therefor of audio data
- G06F16/68—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/686—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title or artist information, time, location or usage information, user ratings
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2201/00—Electronic components, circuits, software, systems or apparatus used in telephone systems
- H04M2201/40—Electronic components, circuits, software, systems or apparatus used in telephone systems using speech recognition
Definitions
- the instant invention relates to visitation sessions occurring in a controlled-access environment, such as a correctional institution.
- the instant invention relates to a system and method for managing and monitoring visitation sessions.
- Typical visitation procedures in a jail setting are created to balance allowing the inmate to have a quality visit with reducing the likelihood of undesirable or inappropriate behavior by both inmates and their visitors.
- certain individuals such as convicted felons, victims, jail employees, co-defendants, former inmates, and the like are normally either not permitted visitation rights, or are permitted only restricted visitation rights. Additionally, individuals may be required to consent to background screening, personal body searches, and other intrusive measures in order to visit an inmate.
- inmates are permitted to have a list of approved visitors. This list may be periodically revised, or it may be permanent. The purpose of the list is not to punish or restrict the inmate to only certain visitors, but rather to reduce the workload of the institution staff tasked with researching and approving each visitor on the list. By providing an inmate with a list of approved visitors, those approved visitors can visit the inmate without having to be repeatedly “cleared” by corrections staff prior to each visit. Some institutions may further restrict these lists, for example by allowing visitors to appear on only a certain number of inmates' lists at any given time. The presence of a pre-approved list of visitors also allows each visit to reduce security risks, as the individual has already been researched and approved. Accordingly, visits by visitors on the pre-approved list can be more efficient and can occur with more regularity.
- Visitations between inmates and the general population can generally occur in one of several methods.
- the simplest method, but also the most risk prone, is a face to face contact visit.
- inmates and visitors are generally located in a common area, supervised by Corrections Officers.
- the inmates and visitors may sit at conference type tables, and may be permitted limited contact, such as hugging or handholding.
- this is the most desirable form of visit from both the visitor's and inmate's points of view, it is also the hardest to control.
- contraband including drugs, money, and weapons could be introduced into the secure prison environment through face to face contact visits. Additionally, it is difficult for corrections officers to enforce rules that allow only certain visitors to visit certain inmates when all inmates and visitors are in a common location.
- Another form of visitation involves placing a physical barrier between the inmate and the visitor.
- the individuals are face to face, but usually separated by a transparent material, such as security glass or Plexiglass.
- the booths are semi-private, with partitions or walls between each visitor and inmate. Physical contact is not permitted between the inmate and the visitor. Communication can be made via normal acoustic transmission through holes in the glass.
- One common addition to this scenario is to place private telephone handsets on each of the visitor side and the inmate side. Once both parties have picked up the handset, they can communicate via the electronic amplification of the phone. Where communication is by telephone handset, there often are no longer holes in the barrier between the inmate and visitor. Both of these forms of visitation still present the difficulty of and risks associated with allowing the general public into the secured prison environment.
- visitation typically employed only by the largest of detention centers
- remote video visitation In this form of visitation, inmates and visitors are in physically separate locations, but are electronically connected via technology analogous to closed circuit television and telephone handsets or speaker phones. This type of visitation completely eliminates the potential for contraband to enter the facility, as the visitors never need be brought behind the secure gates of the prison.
- OMS Offender Management System
- each type of visitation described above can be viewed as addressing some of the shortcomings present in the other types of visitation. For example, in comparison to contact visitation, having an inmate and visitor physically separated by a barrier will reduce, but may not eliminate, the potential to pass contraband between the visitor and the inmate. By using remote video visitation however, the risk of passing contraband between the visitor and the inmate is totally eliminated. Further, the remote video visitation approach is less intrusive to the visitor, as the visitor no longer needs to be physically searched prior to entering a secure area.
- the present invention provides a method of managing visitation in a controlled-access environment.
- the method generally includes the steps of: accessing a visitation control system including a visitation session scheduling interface, a plurality of communications devices, a switching interface, and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation
- the set of rules governing visitation in the controlled-access environment may include one or more operational rules (e.g., rules of general applicability or applicable to a particular class of individuals, rather than applicable to a specific individual).
- the step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment may, for example, include verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.
- the method optionally includes storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system.
- One or more visitation rules associated with a single user of the visitation control system may be defined, and these visitation rules may be associated with a demographic information record.
- the step of establishing communication between the first party to the visitation session and the second party to the visitation session will include establishing at least an audio connection between the first party and the second party through the visitation control system. This may be accomplished, for example, by connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface. Alternatively, both an audio connection and a video connection may be established between the first party and the second party through the visitation control system. The communication between the first party and the second party may be terminated at the conclusion of a preset period of time.
- Whether or not a visitation session is to be monitored may be determined by assessing whether the visitation session meets at least one defined visitation session monitoring criterion. While monitoring the visitation session, the present invention may detect a violation of one or more rules governing visitation in the controlled-access environment and thereafter terminate the communication between the first party and the second party. Alternatively, rather than terminating the communication, the present invention may notify a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
- the method further includes assigning an identification code to at least one of the first party and the second party.
- the identification code may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system.
- the method may include receiving a biometric input measurement from at least one of the first party and the second party and associating the received biometric input measurement with the respective party.
- the biometric input measurement may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system.
- the biometric input measurement may be a fingerprint, a voice print, or any other suitable biometric measurement.
- a system for managing visitation in a controlled-access environment generally including: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including at least one software program controlling the switching interface, at least one software program to schedule a visitation session, and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session.
- the visitation controller typically establishes at
- At least one of the first authentication interface and the second authentication interface may include a biometric interface, such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface.
- a biometric interface such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface.
- at least one of the first authentication interface and the second authentication interface may include an identification code input interface.
- the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.
- the at least one monitoring devices typically enables at least near real-time monitoring of the visitation session.
- the at least one monitoring device may include a recording device to record the visitation session.
- both the first communications device and the second communications device are internal to the controlled-access environment. In other embodiments of the invention, one of the first communications device and the second communications device is external to the controlled-access environment.
- the external communications device may be coupled to the visitation controller via the Internet.
- the system optionally includes at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session. It is contemplated that the at least one visitation scheduling client may be external to the controlled-access environment, and may further communicate with the visitation controller via the Internet.
- the present invention advantageously reduces the paperwork burden on correctional facility staff to “clear” outside parties for visitation sessions.
- Another advantage of the present invention is that it improves compliance of visitation sessions with rules governing visitation in a controlled-environment.
- FIG. 1 is a block diagram of a visitation control system according to an embodiment of the present invention.
- FIG. 2 is an exemplary block diagram of the visitation control unit shown at the center of FIG. 1 .
- FIG. 3 is a block diagram of an application server that may be incorporated into a visitation control unit according to the present invention.
- FIG. 4 is an exemplary block diagram of the storage devices depicted in FIG. 1 .
- FIG. 5 is a flowchart illustrating steps that may be carried out in scheduling a visitation session.
- FIG. 6 is a flowchart illustrating one embodiment of a process for conducting a visitation according to the present invention.
- Visitation approaches described above also present the possibility of fraud (e.g., failures to follow established rules for visitation sessions).
- One common effort to circumvent facility rules regarding visitation sessions is to involve more than one inmate and more than one visitor, performing a switch when the visit actually occurs. For example, suppose Visitor A is not permitted to visit inmate 1 but is permitted to visit inmate 2 . Conversely, suppose Visitor B is permitted to visit inmate 1 but not inmate 2 . Visitors A and B communicate ahead of time and schedule visits at the same time: Visitor A schedules to see inmate 2 , as permitted, and Visitor B schedules to see inmate 1 , as permitted.
- the visitation management system advantageously provides functionality beyond the functionality provided by many OMS software packages.
- the system may be installed and configured to function as a stand-alone system, where all inmates and visitors are manually entered directly into the visitation management system.
- the visitation system according to the present invention may be integrated with an OMS that provides inmate and/or visitor information.
- the system can also be integrated with an Inmate Telephone System, which may also provide inmate and/or visitor demographic information.
- the present invention may be practiced in connection with any of the approaches to visitation described above, as well as any other type of visitation.
- a visitation management system includes a monitoring device that permits one or more third parties, such as corrections officers or court officials, to monitor a visitation session between an inmate and a visitor.
- the term “monitoring,” as used herein, encompasses both live (e.g., real time or near real time) monitoring, for example as by actively listening in on an ongoing visitation session, and recordation of visitation sessions for later review and/or processing.
- live monitoring e.g., real time or near real time
- recordation of visitation sessions for later review and/or processing.
- One suitable post-processing system and methodology is disclosed in U.S. provisional application No. 60/901,342, filed Feb. 15, 2007, which is hereby incorporated by reference as though fully set forth herein.
- the monitoring device may also be capable of playing back audio and/or video as appropriate.
- the monitoring device could be a microphone, speakerphone, video camera, or the like. Combinations of various monitoring devices (e.g., a microphone and a video recorder) could also be employed. Of course, the monitoring device or devices may be either visible to the parties to the visitation session or hidden from their view.
- the visitation management system typically includes one or more databases or data stores, which may include one or more of the following types of data and records, discussed in further detail below: demographic information records, visitation schedule records, visitation log records, visitation recording and/or transcript records, configuration information, and operational rules.
- the database may also include other types of information and/or records as desired or required by a particular implementation of the visitation management system.
- database includes relational databases in which a plurality of data sets are associated with each other and stored, preferably as one or more records; the database may be stored in a single medium or may be stored in multiple media interconnected by a network.
- the demographic information typically includes a variety of data utilized to create records of a plurality of individuals in a variety of role categories.
- Role categories can include, without limitation, Inmates, Visitors, Employees, Official Visitors, Lawyers, and Clergy.
- the demographic information will also typically include at least identification information, such as names, addresses, telephone numbers, and the like for the individuals in the database.
- the demographic data record for an individual may also include or be associated with one or more visitation rules that govern visitation sessions involving that individual.
- Visitation rules may include, for example, permitted to visit, permitted to be a visitor, blocked from visiting, must record, must not record, must be supervised, must be private, time limits, restrictions on visitation sessions by time and/or day, and the like.
- the database may also include visitation schedule records, for example a calendar that reflects open and filled visitation “slots.”
- a scheduled visitation session e.g., a filled visitation “slot” can consist of one or more inmates visiting with one or more individuals, and may be a one time event (e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoccurring series of events (e.g., the first of every month from 2:30 PM until 3:00 PM).
- Scheduling of a visitation session can be initiated by an inmate, by correctional staff, or by the general public (e.g., a prospective visitor from outside the correctional institution).
- Scheduled visitation sessions may take into account factors such as the inmate's daily schedule, the inmate's allowed visitor list (e.g., by applying visitation rules stored or associated with the inmate's demographic data record), the facility's visitation schedule, and resource availability (e.g., the availability of visitation booths or remote video visitation stations for use by the inmate and/or the visitor).
- scheduled visitation sessions can be altered (e.g., moved to a different date or time) or deleted entirely through a visitation session scheduling interface, which may be either locally or remotely located.
- the visitation session scheduling interface may be accessed via a wide area network (WAN), such as the Internet.
- WAN wide area network
- the present invention may also provide the ability to display or print a summary visitation schedule for any arbitrary time period, such as hourly, daily, weekly, monthly, and the like.
- the visitation management system can accommodate both direct entry of scheduled visitation sessions, as well as use in a master/slave configuration where the schedule can be driven by an external system.
- visitation sessions may be scheduled by the public via a publicly-accessible web site or through an automated telephone system connected via the public switched telephone network (PSTN).
- PSTN public switched telephone network
- the visitation management system also preferably stores a history of visitation sessions within the database (referred to herein as “visitation session logs,” “visitation session records,” or “visitation session history”), including information about at least the inmates, visitors, and resources involved in each visitation session.
- a transcription and/or recording of the visitation session can also be stored or associated with the visitation session log.
- each visitation session log may be assigned a unique identifier (e.g., a number or alphanumeric sequence).
- the visitation session logs can be queried in a variety of ways and by employing a variety of different search criteria, such as day, inmate, resource, visitor information, or any combination thereof, which makes visitation session log queries a desirable feature of the present invention.
- different items are often considered contraband in different sections of a correctional facility. Inmates can be very resourceful in getting around facility rules to pass an item from an inmate living in a section where the item is not considered contraband to an inmate living in a section where the item is considered contraband.
- a corrections officer could use the visitation session logs to trace the origin of the contraband to the first inmate.
- a corrections officer could view all visitation session records for a particular visitation resource (e.g., a given visitation booth) and determine which inmates were passing contraband between each other by scheduling visits right after each other (e.g., Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden item hidden in the booth for Inmate B to get during the 4:15 to 4:30 visitation time).
- a visitation session history report can also be used to determine odd patterns in visitation, such as the same visitor visiting many inmates, or a correlation between specific inmates and visitors and other events in the facilities, such as drug finds, contraband detection, or other misbehavior.
- Configuration information may also be maintained within the visitation management system and stored within a database.
- Configuration information includes non-visitation related items, such as the number of phones connected to the visitation management system, where they are located, and a unique name or identifier assigned to each of them. It may also include configuration information about the telephony equipment used, such as board manufacturer, serial numbers, technical data, and the like.
- Operational rules are still another type of data that may be stored in one or more databases included in a visitation management system according to the present invention. Operational rules typically dictate the conditions under which visitation sessions are permitted to occur. Operational rules are similar to the visitation rules that may be associated with individuals in the demographic database. Operational rules, however, apply across several individuals (e.g., to all individuals in the demographic database or to all individuals in a particular class/role), rather than only to a particular individual. Operational rules can include, but are not limited to, time limits for visitation sessions, visitation count limits, person restrictions, time of day, day of week, authentication required, recording required, monitoring allowed, notifications required, and others. For example, operational rules could exist to limit certain classes of inmates to visitation sessions only once a week for thirty minutes, while other classes of inmates are permitted visitation sessions twice a week for one hour.
- the visitation management system preferably enforces operational rules and individual visitation rules both during scheduling of visitation sessions, thereby prohibiting the scheduling of visitation sessions in violation of the rules, as well as during visitation sessions.
- the visitation management system may enforce a time limit operational rule by electronically cutting off the visitation session and/or notifying interested parties, such as staff and corrections officers, after a preset time limit for the visitation session has elapsed or if an unauthorized or impermissible party attempts to join the visitation session.
- the visitation management system is capable of taking direct input from a human operator, for example in a stand alone installation.
- the visitation management system can operate in a master/slave arrangement where another system, such as an OMS or an Inmate Telephone System, serves as master, with the visitation management system receiving data therefrom, which may save time and personnel resources that would otherwise be required for data entry to the visitation management system.
- the disclosed visitation management system can authenticate the parties involved in the visitation session according to one or more of a plurality of authentication methods. For example, when using a handset-based approach to visitation (either remote or face to face with a barrier), when the inmate picks up the handset, the inmate may be prompted to enter a telephone ID number or visitation ID number, known only to the inmate. Similarly, when the visitor picks up the handset, the visitor will be prompted to enter in an ID number known only to the visitor. It is only after successful verification of these ID numbers that the visitation session may proceed.
- the visitation management system to which the handsets are coupled, will only permit communication between the handsets after valid authentication of both parties to the visitation session. Therefore, communication cannot proceed until authorized. It is also at this point that monitoring of the visitation session can occur.
- a unique one time identification code is generated for each visitor. This code may be produced by the system just prior to the visitation session taking place, immediately after identity verification of the visitor (e.g., a photo-ID check) has been performed. Typically, the identification code will be valid only for a preset time period (e.g., the identification code will expire after a certain amount of time). The identification code also preferably expires after it is used once for authentication, thereby reducing the likelihood that an authorized visitor can successfully pass an identification code to an unauthorized visitor.
- Inmate validation can be performed in a similar fashion, or the inmate can use a Telephone ID (TID) number that is shared with the facility's inmate phone system. Inmates generally will not share their TIDs with each other, as it would allow other inmates to make fraudulent charges to the account associated with the TID, making it a suitable identifier to authenticate an inmate to a visitation session.
- TID Telephone ID
- authentication may be performed by using biometric devices, such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification.
- biometric devices such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification.
- biometric techniques can be used in place of, or in addition to, the identification number based authentication methodology described above. For example, either or both of the inmate and the visitor may be required to undergo two-factor identification, including input of an identification number and a fingerprint scan.
- a visitation session typically begins when a corrections officer initiates a visit in the visitation management system. Visitation sessions may also begin automatically when an inmate and visitor both authenticate into a scheduled visitation session. A visitation session will generally continue until it is terminated by a corrections officer, by either of the parties to the visitation system, or by the visitation management system at the expiration of a preset visitation session time limit, which may be established according to one or more operational rules. The visitation session may also be terminated if the visitation management system detects a violation of an operational or individual visitation rule during the course of the visitation session. The system may also provide visual or auditory feedback to a corrections officer when a visitation session has expired or otherwise been terminated. The visitation management system will disconnect all audio or audio/video connections at the expiration of a visitation session.
- the visitation management system may permit corrections staff at a facility to view and/or listen to visitation sessions currently in progress from a computer terminal or other suitable device.
- a corrections officer can select one or more ongoing visitation sessions to monitor, and may be provided with a real time or near real time audio and/or video feed of each monitored visitation session, depending on the type of visitation session.
- an Official Visitor e.g., an individual subject to a “do not monitor” operational or individual visitation rule, such as the inmate's lawyer
- the corrections officer would not be able to monitor the conversation.
- the corrections officer may also participate in the visitation session by talking to one or both parties thereto.
- the corrections officer may also be able to terminate the visitation session at any time through the visitation management system, either with or without warning to the parties to the visitation session, for example upon detecting that a rules violation has occurred during the visitation session.
- the visitation management system may also be configured to permit the corrections officer to transfer a live audio and/or video feed of the visit to any phone, computer terminal, video screen, or the like, be it inside the facility or outside the facility, for monitoring of the visitation session by one or more additional parties.
- the visitation management system may be configured to transfer monitoring to cell phones of investigators, district attorneys, or others. Typically, the transfer of the monitoring would be undetectable by either the inmate or the visitor.
- the transferee party will have the same ability as the corrections officer to join in or terminate the visitation session.
- the audio and/or video of the visit may be recorded, if desired (and permitted by the rules).
- the recorded data may be encoded into a computer-readable format, and may be stored either on a file system or within a database.
- the visitation session record for each visitation session may be assigned a unique identifier that may be used to correlate the participants in the visitation session, the date and time of the visitation session, the location of the visitation session, what corrections officers verified the identities of the participants to the visitation session, and other relevant details.
- the recording of the visitation session and the data associated with the visitation session record can later be searched for and retrieved from within the visitation management system. Searching for visitation sessions can be completed based on one or more of a plurality of criteria including, without limitation, date and/or time of the visitation session, inmate name, inmate ID, visitor name, visitor ID, visitation booth, visitation area, and any combination thereof. Further, the recording of the visitation session can preferably be played back at any time and from any location that has access to a computer or phone system that can connect to the visitation management system.
- the corrections officer may be provided the ability during playback of the visitation session to annotate notes and transcriptions, which may be stored or associated with the visitation session record.
- any recording of the visitation session can be downloaded to removable media, such as a CD or DVD, for playback on many standard devices.
- removable media such as a CD or DVD
- the audio file of a recorded visitation session can be written to a CD for playback in any standard CD player. This would permit, for example, the visitation session to be played back in court if necessary.
- recordings of visitation sessions can be stored on removable media in binary format, advantageously allowing recordings of many visitation sessions to be stored on one disk for playback in a computer.
- Binary recordings also advantageously provide the ability to protect the recording with a security wrapper and/or watermarking process to alleviate tampering concerns.
- the audio of the visitation session can also be transcribed into text by a manual, human-driven process, by real time or near real time audio transcription software, or in a batch software process that can transcribe the audio after the visitation session has concluded.
- the transcript of the visitation session can then advantageously be indexed and searched along with other database records.
- the transcript of the visitation session will be stored or associated with the visitation session history, and can be accessed and printed from within the visitation management system.
- rules can be configured in the visitation management system to flag certain keywords, phrases, or topics of conversations. These rules can be used to notify interested parties when a transcript meeting the rules is stored in the visitation management system (e.g., a rule that notifies a corrections officer whenever the terms “gang” and “cocaine” are both uttered in a visitation session).
- FIG. 1 depicts a block diagram of a visitation management system 100 according to an embodiment of the invention, including the communications connections between the components thereof.
- the visitation control unit 102 which is depicted in further detail in FIG. 2 , is connected to each of the other components of the visitation management system.
- the visitation control unit may communicate via a local area network (LAN) 104 for local resources, such as data storage 106 (shown in further detail in FIG. 4 ), control stations 108 , video communication devices 110 , and audio communication devices 112 .
- the LAN may, but need not be, exclusively Ethernet technology, and thus may employ any type of communication medium and protocol, including analog, voltage based transmission.
- the wide area network (WAN) 114 provides a dedicated, private link between the visitation control unit and remote devices.
- the Internet 116 can be utilized to provide access to remotely distributed control stations, scheduling clients 118 , and home visitation devices 120 .
- the speed requirement of the Internet link is dependent on the number of simultaneous connections supported.
- the visitation control unit is the central processing center for the visitation management system 100 .
- the processing power for the visitation control unit comes from standard personal computer (PC) components, configured in a more robust and redundant server role. This generally means higher quality components, with redundant power supplies, hard drives, and other components, but a standard, off-the-shelf (e.g., consumer-grade) system could also be utilized.
- PC personal computer
- the visitation management system is designed to work with a variety of hardware, such as Intel or AMD based processors, and Operating Systems, such as Microsoft Windows, Linux, Mac OS, and the like.
- the visitation management system itself is independent of the operating system in which it is operating.
- Each server depicted in FIG. 2 can be construed as either a physical hardware device or a virtual server.
- the number of physical hardware machines can be scaled to match the number of simultaneous user connections desired in the visitation management system. Additionally, if space and/or power consumption are considerations, the visitation management system can be scaled down to reduce these concerns.
- the servers that collectively make up the visitation control unit are typically each connected to a central network bus 210 , which will most commonly be an Ethernet connection.
- a central network bus 210 which will most commonly be an Ethernet connection.
- the entire visitation management system may be shielded from the rest of the network at an institution by a router or firewall, which can, of course, be either hardware or software based.
- the video server 212 connects to each of the video visitation devices and performs the necessary electrical connections and switching required to connect two or more visitation station units together for a visitation session.
- the video server can also send the audio and/or video feed to any other computer or device coupled to the visitation control unit for monitoring, recording, or other purposes.
- the video server is capable of performing real time translation of video protocols to allow for different video visitation hardware to be utilized in different locations.
- One of ordinary skill in the art will recognize how the video server establishes a video conference between parties to a visitation session, including, in some instances, a monitoring party.
- the audio server 214 is the audio analogue to the video server.
- the audio server connects audio devices, such as standard telephones, together and can send the output to any additional devices connected to the visitation control unit for monitoring, recording, or other reasons.
- the phone devices can be connected to the server via two wire copper connections, via twisted pair digital connections, wireless/cordless connections, or other techniques that will be familiar to one of ordinary skill.
- the audio server has the capability to detect and respond to DTMF based events, flash hook events, and any other event that can be generated by a telephone device.
- the audio server may also be able to ring the telephone devices.
- the audio server may also be connected to outside telephone lines to route audio to an outside source, such as a land line or cellular phone.
- the web server 216 is typically a standard device, which may run Apache, Microsoft Internet Information Server, or other web server software.
- the primary function of the web server is to route requests and other communications from visitation control stations, remote visitation scheduling clients, and home visitation devices into the appropriate destination within the visitation control unit.
- the web server can also serve as a maintenance point into the visitation control unit for servicing and configuring the system.
- the web server will be connected to both the public Internet and the internal network of an organization (e.g., a private intranet).
- the application server 218 functions as the primary center of logic processing in the visitation management system.
- a block diagram of the application server is shown in FIG. 3 .
- the application server may be a common PC based machine with one or more CPU's 310 connected via a bus 314 to other peripherals including, without limitation, a network card 316 , analog modem 318 , keyboard 320 , mouse (not shown), and a monitor 322 .
- both system memory 322 consisting of RAM, and other data storage 324 , e.g., magnetic, optical, or flash memory may be connected to the bus.
- System memory 322 contains the runtime environment of the application server. While the preferred embodiment of the device contains an operating system 330 (e.g., Windows, Linux, or another operating system), and a Java virtual machine 332 , the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.
- an operating system 330 e.g., Windows, Linux, or another operating system
- a Java virtual machine 332 the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device.
- Internal non-volatile storage 324 preferably, but not necessarily, a hard drive, is used to store the operating system, application files, temporary files used during the operation of the system, and as a temporary storage space for recordings of visitation sessions. It is contemplated that recordings of visitation sessions will periodically be moved to another location, for example by an automated scheduled file transfer process, though recordings of visitation sessions may also be stored on the application server without departing from the spirit and scope of the present invention.
- databases in addition to the storage on the application server, there may also be one or more databases and associated Network Attached Storage (NAS) devices connected to the application server via the network.
- NAS Network Attached Storage
- database is typically used herein to refer to a relational database, the term is also intended to encompass a relational database application or a remotely defined data store.
- the remotely defined data store can be an external system, such as an Inmate Telephone System, an Offender Management System, or other information system application.
- the data store is not a formal data store at all, but rather is a real time link to live data.
- the visitation management system a variety of such data stores and databases are simultaneously employed in a heterogeneous environment.
- the database will typically provide access to a variety of different types of data records.
- data related to an inmate including name, commitment information, address, and the like may be linked to the majority of the remaining data types.
- identification records may be entered directly into the visitation management system or, alternatively, loaded from an external system such as an OMS or Inmate Telephone System.
- Scheduling data is typically generated only within the visitation management system and consists of visitation events that have not yet occurred (e.g., visitation schedule records) as well as historical visit information (e.g., visitation session records).
- a visitation schedule record may include links to all involved parties, including inmates, visitors, and correctional staff (if correctional staff are needed). It may also include links to other resources that will be used in the visitation session, such as inmate visitation booths, telephone reservations, data bandwidth guarantee reservations, as well as other metadata about the visitation session.
- a separate logical data store can be used to store visitation session records, which may include a link to the original visitation session reservation (e.g., the visitation schedule record), any recordings or transcripts of the visitation session, and a list of the actual resources used, if they differed from the resources originally reserved for the visitation session.
- the data is preferably stored in such a way as to facilitate long term storage and easy data reporting capabilities.
- a fourth type of database or data store may include configuration information for the visitation management system itself. As described above, this information may include the connection details of all the various hardware devices connected, such as the video and audio servers, web servers, application servers, and remote devices.
- the configuration data allows the system to be configured with a variety of different hardware types and manufacturers, enabling the application to run under a variety of different configurations depending on the needs and requirements of a given installation of the visitation management system.
- a fifth data store is the Network Attached Storage (NAS) device that may be used to store the actual audio and/or video recordings of visitation sessions.
- NAS Network Attached Storage
- the NAS is preferably a very large storage device that can be expanded as the need arises to accommodate more live (e.g., on-line) storage of visitation session data.
- Various settings can be configured as to the lifespan of the data contained within the NAS. An infinite lifespan of data will, of course, require an infinite amount of storage, so such controls are necessary to limit or reduce the size of the NAS required.
- the capability could also be provided to export visitation session data off the live storage mechanism into permanent off-line storage, such as optical media for archival purposes or for presenting as evidence in court or aiding in the investigation of criminal activity.
- standard analog inmate telephones are preferably used for audio communication during face to face and remote visitation sessions. They could also be used for video visitation sessions if the selected video communication device does not provide audio services.
- the phones in the visitation management system according to the present invention are coupled to the audio server (e.g., the visitation control unit) rather than being directly connected to each other in pairs.
- the audio server e.g., the visitation control unit
- they will typically be connected to the server via a 66 block or other interface block.
- the phones since they are not connected directly together, require the audio server to provide line power and logical switching services.
- the phones can easily be changed in real time to be connected to other devices. This advantageously increases the flexibility of the visitation management system, permitting such configurations as a many-to-many connection between telephones, while also providing a convenient controller (e.g., the visitation control unit).
- smart phones may be used instead of, or in addition to, analog phones, similarly connected over a network to the audio server.
- the addition of smart phones could facilitate implementation of additional features in the visitation management system, such as authentication of parties to a visitation session as described above (e.g., via biometric identification devices or card readers), payment services (e.g., via credit card readers for ‘for-pay’ visitations), or deposits into an inmate accounting system.
- Smart phones could also introduce additional interactive services, such as display readouts for elapsed and remaining times, or other information.
- the phones used in the visitation management system of the present invention preferably are not connected for communication until the controlling hardware (e.g., the visitation control unit) and the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface. This allows for precise timing of visits, authentication, and the ability to interrupt the visit by a third party.
- the controlling hardware e.g., the visitation control unit
- the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface.
- Video visitation devices may be connected in a similar manner as phone devices-that is, via a central video server incorporated into the visitation control unit, rather than directly together.
- the video devices function similarly to the audio devices.
- video conferencing stations can be located in the same building connected via a LAN, coupled across a relatively short distance (e.g., within the same town) via a WAN, or coupled across a much larger distance (e.g., across several states) via an extended WAN.
- the video conferencing devices have the capability to split audio signals from video signals to transmit the two signals to two different devices. This capability is may be used, for example, when connecting from a dedicated video conference station that supports both audio and video to a remote web-cam for video transmission via the Internet and a standard telephone for audio transmission via telephone lines.
- the computers Connected to the application server is a theoretically unlimited number of local client computers.
- the computers are running a local web browser, such as Microsoft's Internet Explorer, or Mozilla's Firefox.
- the browsers interpret user interactions and inputs and transmit these interactions and inputs to the application servers, where the interactions and inputs are used to control the audio and video servers.
- Clients are also able to administer the system, such as setting up resources and viewing, inserting, and deleting inmates or visitation sessions.
- the web application also provides mechanisms to view the current state of the system.
- the “current state of the system” is all active visitation sessions happening within the visitation management system.
- the amount of data visible to the user may be limited by the user's role. For example, some corrections officers may be able to see only that an inmate is in a visitation session, while other corrections officers could see where the visit is occurring and what type of visitation session it is (e.g., telephonic, remote video, in person). Still other classes of users may be able to listen in on and/or view the visitation session, as well as terminate or extend the visitation session.
- the visitation management system may be part of a larger application, such as an Offender Management System or Inmate Telephone System, or it may be a standalone application depending on client configuration and modules installed. While the visitation management system is, in some embodiments, a web-based system, it is also contemplated that the functionality of the system can be delivered via a variety of application platforms, including, but not limited to, client/server or rich client.
- a facility may provide access to the visitation management system via the Internet or other communication network.
- remote clients typically also running web browsers such as Microsoft's Internet Explorer or Mozilla Firefox, will be able to access the visitation management system as though locally connected to the visitation management system.
- One potential user of a remote client might be an investigator, not located at the correctional facility, who is interested in all visitation sessions involving a particular inmate. This investigator could be notified automatically by the visitation management system when a visitation session is occurring, and the investigator can log on to the visitation management system from any Internet-connected remote location and device to view and/or listen to the visitation session in progress.
- a special type of limited client access can also be provided to the general public in order to schedule and conduct visitation sessions via a home personal computer.
- the visitor uses a web camera connected to the visitor's home PC, which is connected to the Internet.
- the individual logs on to the visitation management system via the world wide web to request and schedule visitation sessions, as well as to actually participate in a visitation session.
- Audio visitation sessions would work in a fashion similar to an inmate telephone call, though the visit is at a predetermined time and is mutually initiated.
- a video visitation session will use the web camera to transmit video, and the monitor will display video. Audio can be transmitted via a standard phone line or via computer speakers and microphone.
- visitation sessions will also be able to be monitored, transcribed, and/or controlled from any other client connected to the visitation management system.
- the maximum number of simultaneous remote visitation sessions is controlled by available bandwidth coming from the facility, as well as the physical number of video or audio devices that exist.
- special dedicated terminals may be provided outside the correctional facility, but still within the correctional enterprise's network, to perform the same or similar functions.
- a significant advantage of the visitation management system is its ability to integrate with a variety of other solutions for the corrections market.
- Services can be provided to integrate directly at the database level, where inmates and other data can be moved seamlessly from one system to another (e.g., between an OMS and the visitation management system).
- Services can also exist to integrate at a higher level, such as the visitation management system sending messages on events occurring to external systems. For example, a visitation session involving a particular inmate may trigger a message to an outside system, such as an investigator, District Attorney, or court system. Integration may also exist to connect visitation management systems at several correctional facilities to allow for facility to facility visitation sessions.
- FIGS. 5 and 6 are flowcharts of a visitation process using the visitation management system. Scheduling of a visitation session is initiated by either an inmate or by the visitor. The visitation session can be scheduled far in advance, and is made according to the operational rules of the correctional facility. For example, a correctional facility may require that an inmate only has three visitation sessions per month or that only approved visitors may participate in visitation sessions. Regardless of how the visit schedule is created (e.g., whether initiate by the inmate or initiated by the visitor), the operational rules are preferably enforced by the visitation management system to ensure that only compliant visitation sessions are scheduled.
- a visitor may initiate the scheduling process. Often times, a visitor must be approved before a visitation session can be scheduled. A visitor can place himself or herself on a waiting list to be approved by the facility if the visitor is not already on the list. Individual combinations of visitors and inmates may be approved. Alternatively, certain visitors may be approved to visit any inmate.
- the visitor can schedule a visitation session by browsing for available days and times. Available visitation sessions may be presented by taking into account the facility's visiting hours, the inmate's schedule, and other facility rules as reflected in the visitation schedule records. An option could also exist to auto-pick the first available time for a visitation session.
- a record of the visitation session is created in the appropriate database or data store detailing at least the participants in the visit (e.g., the name of the inmate and the name, address, and phone number of the visitor), and, in some embodiments of the invention, the resources that will be required to participate in the visit, such as visitation booths, video devices, or room reservations.
- the visitor is notified of the confirmed visitation session date and time and may be given a confirmation code that uniquely identifies the scheduled visitation session.
- the scheduled visitation session can be modified by the inmate, the visitor, or an administrative individual. Modifications can include changes in date and/or time, resource changes, or a complete cancellation of the visitation session.
- the visitor Upon any change to the reservation, the visitor must be notified of the change. This can be done via email, postal mail, or via telephone.
- the record of the visitation session may also be updated.
- both the inmate and the visitor must be located in the proper place for the visit.
- the individuals involved in the visitation session both inmate and visitor, must be positively identified by a corrections officer as well as authenticated to the visitation session as described herein.
- it is easy to positively identify an inmate as inmates are required to have identification on them at all times.
- the inmate can further be positively identified by requiring a unique telephone or visitation session identification code to be entered into a phone or video device before the visitation session can proceed. Identifying individuals of the general public can be more problematic, but facility rules can be set up to require a state or federally issued identification card to be shown before the visitation session can commence.
- a unique one-time code can be generated that will only allow the visitor to participate in the visitation session the visitor was scheduled for. This helps prevent a common scenario where visitors try to circumvent facility rules to visit someone they are not permitted to visit. Additionally, identification and authentication can also be performed via biometric devices, such as fingerprint readers.
- the visitation management system will initiate a timer to calculate the elapsed and remaining time of the visitation session.
- any individual with the proper rights and privileges can view visitation sessions in progress, listen in on them, or speak to one or both parties to the visitation session.
- Appropriately credentialed users may also be able to terminate the visitation session or grant additional time to the parties.
- the visitation session may also be recorded so that individuals can review a recording and/or transcript of the visitation session at a later time.
- participant may be notified of the time remaining in the visitation session.
- a prompt such as “You have 3 minutes remaining for this visit” can be played over a telephone or other audio device or overlaid on the screen for a video visit.
- the visitation management system automatically terminates the logical device connections (e.g., the connection between telephone or video devices) to ensure that no further communication can take place between the inmate and the visitor.
- the visitation management system then creates a record of the completed visitation session as described herein.
- the system can start a transcription process to convert any recorded audio into searchable text.
- the inmate is escorted back to his or her cell, and the visitor can leave the facility at this point.
- the visitation booths are now available for use for other visitation sessions.
- the visitation session record becomes available for retrieval at a later point by corrections officers, police officers, investigators, and others who may require access.
- the visitation management system advantageously allows for searching of past visitation sessions via such criteria as inmate name, visitor name, visitation session locations, dates and times, content of the visitation sessions (e.g., topics discussed), and unique visit IDs.
- the application server queries the database for results matching the user's request.
- the results will be formatted and presented back to the user, typically via the web browser.
- the user can then export the details of one or more of the output visitation sessions, or the audio and/or video of the visitation session, if available, to external media, such as CD or DVD.
- the media can be presented in court, if needed, to serve as evidence.
- the term “party,” as used herein, should not be construed to refer to only a single individual, but rather is intended to encompass one “side” of a visitation session (e.g., in a visitation session between an inmate and the inmate's family, the inmate is a party and the family is a party).
Abstract
Description
- This application is related to U.S. provisional application No. 60/901,342, filed Feb. 15, 2007 and U.S. application Ser. No. 11/706,431, filed Feb. 15, 2007. The foregoing are hereby incorporated by reference as though fully set forth herein.
- a. Field of the Invention
- The instant invention relates to visitation sessions occurring in a controlled-access environment, such as a correctional institution. In particular, the instant invention relates to a system and method for managing and monitoring visitation sessions.
- b. Background Art
- In the correctional industry, inmate visitation is an essential part of rehabilitation of an inmate. Numerous studies have shown that visitation by friends and family can help reduce recidivism as well as prepare an inmate for life after prison. Since the vast majority of inmates are eventually released into the public, any steps to minimize the problems the individual may have upon re-entering public life are welcomed.
- Typical visitation procedures in a jail setting are created to balance allowing the inmate to have a quality visit with reducing the likelihood of undesirable or inappropriate behavior by both inmates and their visitors. To this end, certain individuals, such as convicted felons, victims, jail employees, co-defendants, former inmates, and the like are normally either not permitted visitation rights, or are permitted only restricted visitation rights. Additionally, individuals may be required to consent to background screening, personal body searches, and other intrusive measures in order to visit an inmate.
- In many institutions, inmates are permitted to have a list of approved visitors. This list may be periodically revised, or it may be permanent. The purpose of the list is not to punish or restrict the inmate to only certain visitors, but rather to reduce the workload of the institution staff tasked with researching and approving each visitor on the list. By providing an inmate with a list of approved visitors, those approved visitors can visit the inmate without having to be repeatedly “cleared” by corrections staff prior to each visit. Some institutions may further restrict these lists, for example by allowing visitors to appear on only a certain number of inmates' lists at any given time. The presence of a pre-approved list of visitors also allows each visit to reduce security risks, as the individual has already been researched and approved. Accordingly, visits by visitors on the pre-approved list can be more efficient and can occur with more regularity.
- Visitations between inmates and the general population can generally occur in one of several methods. The simplest method, but also the most risk prone, is a face to face contact visit. In this type of visit, inmates and visitors are generally located in a common area, supervised by Corrections Officers. The inmates and visitors may sit at conference type tables, and may be permitted limited contact, such as hugging or handholding. Although this is the most desirable form of visit from both the visitor's and inmate's points of view, it is also the hardest to control. If inmates and visitors are not physically screened before and after visits, contraband, including drugs, money, and weapons could be introduced into the secure prison environment through face to face contact visits. Additionally, it is difficult for corrections officers to enforce rules that allow only certain visitors to visit certain inmates when all inmates and visitors are in a common location.
- Another form of visitation involves placing a physical barrier between the inmate and the visitor. In this form of visitation, the individuals are face to face, but usually separated by a transparent material, such as security glass or Plexiglass. Generally, the booths are semi-private, with partitions or walls between each visitor and inmate. Physical contact is not permitted between the inmate and the visitor. Communication can be made via normal acoustic transmission through holes in the glass. One common addition to this scenario is to place private telephone handsets on each of the visitor side and the inmate side. Once both parties have picked up the handset, they can communicate via the electronic amplification of the phone. Where communication is by telephone handset, there often are no longer holes in the barrier between the inmate and visitor. Both of these forms of visitation still present the difficulty of and risks associated with allowing the general public into the secured prison environment.
- Another form of visitation, typically employed only by the largest of detention centers, is remote video visitation. In this form of visitation, inmates and visitors are in physically separate locations, but are electronically connected via technology analogous to closed circuit television and telephone handsets or speaker phones. This type of visitation completely eliminates the potential for contraband to enter the facility, as the visitors never need be brought behind the secure gates of the prison.
- All of the visitation types described above have in common that certain paperwork and research must be completed by the facility before the visitation session can occur. In some facilities, software, such as an Offender Management System (OMS), has automated part of the record keeping process, storing inmate information along with visitor information in the computer system. In more sophisticated OMS installations, the software can also perform basic enemy checking, employee checking, and past felony checking on visitors with the data already stored in the OMS database.
- In addition, each type of visitation described above can be viewed as addressing some of the shortcomings present in the other types of visitation. For example, in comparison to contact visitation, having an inmate and visitor physically separated by a barrier will reduce, but may not eliminate, the potential to pass contraband between the visitor and the inmate. By using remote video visitation however, the risk of passing contraband between the visitor and the inmate is totally eliminated. Further, the remote video visitation approach is less intrusive to the visitor, as the visitor no longer needs to be physically searched prior to entering a secure area.
- The present invention provides a method of managing visitation in a controlled-access environment. The method generally includes the steps of: accessing a visitation control system including a visitation session scheduling interface, a plurality of communications devices, a switching interface, and at least one authentication interface; defining a set of rules governing visitation in the controlled-access environment; requesting a visitation session using the visitation session scheduling interface of the visitation control system; assessing whether the visitation session complies with the set of rules governing visitation in the controlled-access environment; scheduling the visitation session if the visitation session complies with the set of rules governing visitation in the controlled-access environment; using the at least one authentication interface to authenticate a first party to the visitation session; using the at least one authentication interface to authenticate a second party to the visitation session; establishing communication between the first party to the visitation and the second party to the visitation session after authenticating both the first party and the second party to the visitation session; and storing a record of the visitation session in a visitation session database, the record of the visitation including at least information regarding identities of the first party and the second party. The set of rules governing visitation in the controlled-access environment may include one or more operational rules (e.g., rules of general applicability or applicable to a particular class of individuals, rather than applicable to a specific individual). The step of assessing whether the visitation session complies with a set of rules governing visitation in the controlled-access environment may, for example, include verifying that neither the first party nor the second party is prohibited from participating in visitation sessions.
- The method optionally includes storing a plurality of demographic information records in a demographic information database, each of the plurality of demographic information records including demographic information for a single user of the visitation control system. One or more visitation rules associated with a single user of the visitation control system may be defined, and these visitation rules may be associated with a demographic information record.
- Typically, the step of establishing communication between the first party to the visitation session and the second party to the visitation session will include establishing at least an audio connection between the first party and the second party through the visitation control system. This may be accomplished, for example, by connecting a first one of the plurality of communications devices to a second one of the plurality of communications devices via the switching interface. Alternatively, both an audio connection and a video connection may be established between the first party and the second party through the visitation control system. The communication between the first party and the second party may be terminated at the conclusion of a preset period of time.
- It is also desirable to determine whether the visitation session is to be monitored and to monitor the visitation session in response to a determination that the visitation session is to be monitored. Whether or not a visitation session is to be monitored may be determined by assessing whether the visitation session meets at least one defined visitation session monitoring criterion. While monitoring the visitation session, the present invention may detect a violation of one or more rules governing visitation in the controlled-access environment and thereafter terminate the communication between the first party and the second party. Alternatively, rather than terminating the communication, the present invention may notify a third party upon detecting the violation of one or more rules governing visitation in the controlled-access environment.
- In some embodiments, the method further includes assigning an identification code to at least one of the first party and the second party. The identification code may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. Alternatively, or in addition, the method may include receiving a biometric input measurement from at least one of the first party and the second party and associating the received biometric input measurement with the respective party. The biometric input measurement may then be used to authenticate either or both of the first party to the visitation session and the second party to the visitation session to the visitation system. The biometric input measurement may be a fingerprint, a voice print, or any other suitable biometric measurement.
- Also disclosed herein is a system for managing visitation in a controlled-access environment, generally including: a visitation controller including a switching interface and a central processing unit to run a plurality of software programs, the plurality of software programs including at least one software program controlling the switching interface, at least one software program to schedule a visitation session, and at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment; a first communications device coupled to the visitation controller; a second communications device coupled to the visitation controller; a first authentication interface coupled to the visitation controller to authenticate a first party to a visitation session; a second authentication interface coupled to the visitation controller to authenticate a second party to a visitation session; at least one monitoring device coupled to the visitation controller to enable monitoring of the visitation session; and a database coupled to the visitation controller to store a record of the visitation session, the record including at least information regarding identities of the first party to the visitation session and the second party to the visitation session. The visitation controller typically establishes at least audio communication between the first communications device and the second communications device through the switching interface, and may establish both audio communication and video communication between the first communications device and the second communications device through the switching interface.
- At least one of the first authentication interface and the second authentication interface may include a biometric interface, such as a fingerprint identification interface, a voice print identification interface, or another suitable biometric interface. Alternatively, or in addition, at least one of the first authentication interface and the second authentication interface may include an identification code input interface.
- Preferably, the at least one software program to schedule a visitation session and the at least one software program monitoring compliance with a set of rules governing visitation in the controlled-access environment cooperate to prohibit scheduling of a visitation session that does not comply with the set of rules governing visitation in the controlled-access environment.
- The at least one monitoring devices typically enables at least near real-time monitoring of the visitation session. For example, the at least one monitoring device may include a recording device to record the visitation session.
- In some embodiments of the invention, both the first communications device and the second communications device are internal to the controlled-access environment. In other embodiments of the invention, one of the first communications device and the second communications device is external to the controlled-access environment. The external communications device may be coupled to the visitation controller via the Internet.
- The system optionally includes at least one visitation scheduling client in communication with the visitation controller and configured to invoke the at least one software program to schedule a visitation session. It is contemplated that the at least one visitation scheduling client may be external to the controlled-access environment, and may further communicate with the visitation controller via the Internet.
- The present invention advantageously reduces the paperwork burden on correctional facility staff to “clear” outside parties for visitation sessions.
- Another advantage of the present invention is that it improves compliance of visitation sessions with rules governing visitation in a controlled-environment.
- The foregoing and other aspects, features, details, utilities, and advantages of the present invention will be apparent from reading the following description and claims, and from reviewing the accompanying drawings.
-
FIG. 1 is a block diagram of a visitation control system according to an embodiment of the present invention. -
FIG. 2 is an exemplary block diagram of the visitation control unit shown at the center ofFIG. 1 . -
FIG. 3 is a block diagram of an application server that may be incorporated into a visitation control unit according to the present invention. -
FIG. 4 is an exemplary block diagram of the storage devices depicted inFIG. 1 . -
FIG. 5 is a flowchart illustrating steps that may be carried out in scheduling a visitation session. -
FIG. 6 is a flowchart illustrating one embodiment of a process for conducting a visitation according to the present invention. - While the visitation approaches described above address, to a certain extent, the problems of contraband and security within the prison, they can introduce issues with paperwork, research, and expense to the facility. Further, where the visitation session between the inmate and the visitor is conducted electronically, there is the potential to gather valuable information from the communication between the inmate and the visitor. For any information gathered to be of value, however, the parties in the communication need to be positively identified. In existing visitation approaches, positive identification is often difficult; often, the best that can be done is an educated guess based on paper logs, reports, and correction officer observations.
- The visitation approaches described above also present the possibility of fraud (e.g., failures to follow established rules for visitation sessions). One common effort to circumvent facility rules regarding visitation sessions is to involve more than one inmate and more than one visitor, performing a switch when the visit actually occurs. For example, suppose Visitor A is not permitted to visit inmate 1 but is permitted to visit inmate 2. Conversely, suppose Visitor B is permitted to visit inmate 1 but not inmate 2. Visitors A and B communicate ahead of time and schedule visits at the same time: Visitor A schedules to see inmate 2, as permitted, and Visitor B schedules to see inmate 1, as permitted. After Visitors A and B are identified by the prison staff and are waiting to visit their respective inmates, however, they switch credentials or just simply switch seats to visit the inmates they are restricted from seeing. This type of visitation fraud is often occurs in large facilities where there are large numbers of visitors and inmates at any given time, making it difficult for corrections officers to individually recognize each of the inmates and visitors when monitoring the various visitation sessions occurring.
- Another somewhat less serious form of visitation fraud involves inmates and visitors not observing time limits placed on visitation sessions, which are typically in the range of about fifteen to about sixty minutes. Prison resources are limited in nature, and only so many visits can be handled concurrently. Rigorously enforcing time restrictions makes better use of these resources, allowing more inmates the opportunity to participate in the visiting process. Of course, in a large facility, it requires considerable coordination by the prison staff to ensure that the visits do not extend past their allotted time, making it difficult for corrections officers to monitor time restrictions for all visitation sessions.
- The visitation management system according to the present invention advantageously provides functionality beyond the functionality provided by many OMS software packages. The system may be installed and configured to function as a stand-alone system, where all inmates and visitors are manually entered directly into the visitation management system. Alternatively, the visitation system according to the present invention may be integrated with an OMS that provides inmate and/or visitor information. Of course, the system can also be integrated with an Inmate Telephone System, which may also provide inmate and/or visitor demographic information. It should further be understood that the present invention may be practiced in connection with any of the approaches to visitation described above, as well as any other type of visitation.
- In general, regardless of the visitation approach employed, a visitation management system according to the present invention includes a monitoring device that permits one or more third parties, such as corrections officers or court officials, to monitor a visitation session between an inmate and a visitor. The term “monitoring,” as used herein, encompasses both live (e.g., real time or near real time) monitoring, for example as by actively listening in on an ongoing visitation session, and recordation of visitation sessions for later review and/or processing. One suitable post-processing system and methodology is disclosed in U.S. provisional application No. 60/901,342, filed Feb. 15, 2007, which is hereby incorporated by reference as though fully set forth herein.
- In the case of handset and video visitation, the monitoring device may also be capable of playing back audio and/or video as appropriate. In face to face contact visitation settings, the monitoring device could be a microphone, speakerphone, video camera, or the like. Combinations of various monitoring devices (e.g., a microphone and a video recorder) could also be employed. Of course, the monitoring device or devices may be either visible to the parties to the visitation session or hidden from their view.
- The visitation management system typically includes one or more databases or data stores, which may include one or more of the following types of data and records, discussed in further detail below: demographic information records, visitation schedule records, visitation log records, visitation recording and/or transcript records, configuration information, and operational rules. Of course, the database may also include other types of information and/or records as desired or required by a particular implementation of the visitation management system. The term “database,” as used herein includes relational databases in which a plurality of data sets are associated with each other and stored, preferably as one or more records; the database may be stored in a single medium or may be stored in multiple media interconnected by a network.
- The demographic information typically includes a variety of data utilized to create records of a plurality of individuals in a variety of role categories. Role categories can include, without limitation, Inmates, Visitors, Employees, Official Visitors, Lawyers, and Clergy. The demographic information will also typically include at least identification information, such as names, addresses, telephone numbers, and the like for the individuals in the database.
- The demographic data record for an individual may also include or be associated with one or more visitation rules that govern visitation sessions involving that individual. Visitation rules may include, for example, permitted to visit, permitted to be a visitor, blocked from visiting, must record, must not record, must be supervised, must be private, time limits, restrictions on visitation sessions by time and/or day, and the like.
- The database may also include visitation schedule records, for example a calendar that reflects open and filled visitation “slots.” A scheduled visitation session (e.g., a filled visitation “slot”) can consist of one or more inmates visiting with one or more individuals, and may be a one time event (e.g., Wednesday from 11:00 AM until 11:30 PM) or a reoccurring series of events (e.g., the first of every month from 2:30 PM until 3:00 PM).
- Scheduling of a visitation session can be initiated by an inmate, by correctional staff, or by the general public (e.g., a prospective visitor from outside the correctional institution). Scheduled visitation sessions may take into account factors such as the inmate's daily schedule, the inmate's allowed visitor list (e.g., by applying visitation rules stored or associated with the inmate's demographic data record), the facility's visitation schedule, and resource availability (e.g., the availability of visitation booths or remote video visitation stations for use by the inmate and/or the visitor). Preferably, scheduled visitation sessions can be altered (e.g., moved to a different date or time) or deleted entirely through a visitation session scheduling interface, which may be either locally or remotely located. In some embodiments, the visitation session scheduling interface may be accessed via a wide area network (WAN), such as the Internet. The present invention may also provide the ability to display or print a summary visitation schedule for any arbitrary time period, such as hourly, daily, weekly, monthly, and the like. As will be described in further detail below, the visitation management system can accommodate both direct entry of scheduled visitation sessions, as well as use in a master/slave configuration where the schedule can be driven by an external system. For example, in some embodiments of the invention, visitation sessions may be scheduled by the public via a publicly-accessible web site or through an automated telephone system connected via the public switched telephone network (PSTN).
- The visitation management system according to the present invention also preferably stores a history of visitation sessions within the database (referred to herein as “visitation session logs,” “visitation session records,” or “visitation session history”), including information about at least the inmates, visitors, and resources involved in each visitation session. A transcription and/or recording of the visitation session can also be stored or associated with the visitation session log. To facilitate storage and retrieval of the visitation session logs, each visitation session log may be assigned a unique identifier (e.g., a number or alphanumeric sequence).
- Preferably, the visitation session logs can be queried in a variety of ways and by employing a variety of different search criteria, such as day, inmate, resource, visitor information, or any combination thereof, which makes visitation session log queries a desirable feature of the present invention. For example, different items are often considered contraband in different sections of a correctional facility. Inmates can be very resourceful in getting around facility rules to pass an item from an inmate living in a section where the item is not considered contraband to an inmate living in a section where the item is considered contraband. Upon discovering contraband with the second inmate, a corrections officer could use the visitation session logs to trace the origin of the contraband to the first inmate. For example, a corrections officer could view all visitation session records for a particular visitation resource (e.g., a given visitation booth) and determine which inmates were passing contraband between each other by scheduling visits right after each other (e.g., Inmate A was in booth 1 from 4:00 to 4:15 and left a forbidden item hidden in the booth for Inmate B to get during the 4:15 to 4:30 visitation time). A visitation session history report can also be used to determine odd patterns in visitation, such as the same visitor visiting many inmates, or a correlation between specific inmates and visitors and other events in the facilities, such as drug finds, contraband detection, or other misbehavior.
- Configuration information may also be maintained within the visitation management system and stored within a database. Configuration information includes non-visitation related items, such as the number of phones connected to the visitation management system, where they are located, and a unique name or identifier assigned to each of them. It may also include configuration information about the telephony equipment used, such as board manufacturer, serial numbers, technical data, and the like.
- Operational rules are still another type of data that may be stored in one or more databases included in a visitation management system according to the present invention. Operational rules typically dictate the conditions under which visitation sessions are permitted to occur. Operational rules are similar to the visitation rules that may be associated with individuals in the demographic database. Operational rules, however, apply across several individuals (e.g., to all individuals in the demographic database or to all individuals in a particular class/role), rather than only to a particular individual. Operational rules can include, but are not limited to, time limits for visitation sessions, visitation count limits, person restrictions, time of day, day of week, authentication required, recording required, monitoring allowed, notifications required, and others. For example, operational rules could exist to limit certain classes of inmates to visitation sessions only once a week for thirty minutes, while other classes of inmates are permitted visitation sessions twice a week for one hour.
- The visitation management system preferably enforces operational rules and individual visitation rules both during scheduling of visitation sessions, thereby prohibiting the scheduling of visitation sessions in violation of the rules, as well as during visitation sessions. For example, the visitation management system may enforce a time limit operational rule by electronically cutting off the visitation session and/or notifying interested parties, such as staff and corrections officers, after a preset time limit for the visitation session has elapsed or if an unauthorized or impermissible party attempts to join the visitation session.
- The primary difference between the various installation configurations (e.g., stand alone, OMS-integrated, Inmate Telephone System-integrated) of the visitation management system described above is in the performance of data entry. As described herein, the visitation management system is capable of taking direct input from a human operator, for example in a stand alone installation. Alternatively, the visitation management system can operate in a master/slave arrangement where another system, such as an OMS or an Inmate Telephone System, serves as master, with the visitation management system receiving data therefrom, which may save time and personnel resources that would otherwise be required for data entry to the visitation management system.
- Thus, one of skill in the art will recognize that the systems and methods disclosed herein can be practiced to good advantage in any combination of visitation approaches and installation configurations without departing from the spirit and scope of the present invention.
- One advantageous feature of the visitation management system according to the present invention is authentication of the parties to a visitation session. The disclosed visitation management system can authenticate the parties involved in the visitation session according to one or more of a plurality of authentication methods. For example, when using a handset-based approach to visitation (either remote or face to face with a barrier), when the inmate picks up the handset, the inmate may be prompted to enter a telephone ID number or visitation ID number, known only to the inmate. Similarly, when the visitor picks up the handset, the visitor will be prompted to enter in an ID number known only to the visitor. It is only after successful verification of these ID numbers that the visitation session may proceed. The visitation management system, to which the handsets are coupled, will only permit communication between the handsets after valid authentication of both parties to the visitation session. Therefore, communication cannot proceed until authorized. It is also at this point that monitoring of the visitation session can occur.
- The generation of authentication identifiers for inmates and visitors can be performed in a variety of ways. In some embodiments of the invention, a unique one time identification code is generated for each visitor. This code may be produced by the system just prior to the visitation session taking place, immediately after identity verification of the visitor (e.g., a photo-ID check) has been performed. Typically, the identification code will be valid only for a preset time period (e.g., the identification code will expire after a certain amount of time). The identification code also preferably expires after it is used once for authentication, thereby reducing the likelihood that an authorized visitor can successfully pass an identification code to an unauthorized visitor.
- Inmate validation can be performed in a similar fashion, or the inmate can use a Telephone ID (TID) number that is shared with the facility's inmate phone system. Inmates generally will not share their TIDs with each other, as it would allow other inmates to make fraudulent charges to the account associated with the TID, making it a suitable identifier to authenticate an inmate to a visitation session.
- It is also contemplated that authentication may be performed by using biometric devices, such as finger print readers, iris scan readers, voice verification techniques, Radio Frequency ID, and other standard ways of ensuring positive identification. These biometric techniques can be used in place of, or in addition to, the identification number based authentication methodology described above. For example, either or both of the inmate and the visitor may be required to undergo two-factor identification, including input of an identification number and a fingerprint scan.
- A visitation session typically begins when a corrections officer initiates a visit in the visitation management system. Visitation sessions may also begin automatically when an inmate and visitor both authenticate into a scheduled visitation session. A visitation session will generally continue until it is terminated by a corrections officer, by either of the parties to the visitation system, or by the visitation management system at the expiration of a preset visitation session time limit, which may be established according to one or more operational rules. The visitation session may also be terminated if the visitation management system detects a violation of an operational or individual visitation rule during the course of the visitation session. The system may also provide visual or auditory feedback to a corrections officer when a visitation session has expired or otherwise been terminated. The visitation management system will disconnect all audio or audio/video connections at the expiration of a visitation session.
- The visitation management system may permit corrections staff at a facility to view and/or listen to visitation sessions currently in progress from a computer terminal or other suitable device. Preferably, a corrections officer can select one or more ongoing visitation sessions to monitor, and may be provided with a real time or near real time audio and/or video feed of each monitored visitation session, depending on the type of visitation session. Of course, if a visitation session is being conducted with an Official Visitor (e.g., an individual subject to a “do not monitor” operational or individual visitation rule, such as the inmate's lawyer), the corrections officer would not be able to monitor the conversation.
- In addition to monitoring a visitation session in progress, the corrections officer may also participate in the visitation session by talking to one or both parties thereto. The corrections officer may also be able to terminate the visitation session at any time through the visitation management system, either with or without warning to the parties to the visitation session, for example upon detecting that a rules violation has occurred during the visitation session.
- The visitation management system may also be configured to permit the corrections officer to transfer a live audio and/or video feed of the visit to any phone, computer terminal, video screen, or the like, be it inside the facility or outside the facility, for monitoring of the visitation session by one or more additional parties. For example, the visitation management system may be configured to transfer monitoring to cell phones of investigators, district attorneys, or others. Typically, the transfer of the monitoring would be undetectable by either the inmate or the visitor. Preferably, the transferee party will have the same ability as the corrections officer to join in or terminate the visitation session.
- During a visitation session, the audio and/or video of the visit may be recorded, if desired (and permitted by the rules). The recorded data may be encoded into a computer-readable format, and may be stored either on a file system or within a database. As described above, the visitation session record for each visitation session may be assigned a unique identifier that may be used to correlate the participants in the visitation session, the date and time of the visitation session, the location of the visitation session, what corrections officers verified the identities of the participants to the visitation session, and other relevant details.
- As described above, the recording of the visitation session and the data associated with the visitation session record can later be searched for and retrieved from within the visitation management system. Searching for visitation sessions can be completed based on one or more of a plurality of criteria including, without limitation, date and/or time of the visitation session, inmate name, inmate ID, visitor name, visitor ID, visitation booth, visitation area, and any combination thereof. Further, the recording of the visitation session can preferably be played back at any time and from any location that has access to a computer or phone system that can connect to the visitation management system. The corrections officer may be provided the ability during playback of the visitation session to annotate notes and transcriptions, which may be stored or associated with the visitation session record.
- It is also contemplated that any recording of the visitation session can be downloaded to removable media, such as a CD or DVD, for playback on many standard devices. For example, in the case of a handset based approach to visitation, the audio file of a recorded visitation session can be written to a CD for playback in any standard CD player. This would permit, for example, the visitation session to be played back in court if necessary. Additionally, recordings of visitation sessions can be stored on removable media in binary format, advantageously allowing recordings of many visitation sessions to be stored on one disk for playback in a computer. Binary recordings also advantageously provide the ability to protect the recording with a security wrapper and/or watermarking process to alleviate tampering concerns.
- In some embodiments of the invention, the audio of the visitation session can also be transcribed into text by a manual, human-driven process, by real time or near real time audio transcription software, or in a batch software process that can transcribe the audio after the visitation session has concluded.
- The transcript of the visitation session can then advantageously be indexed and searched along with other database records. Typically, like the recording of a visitation session, the transcript of the visitation session will be stored or associated with the visitation session history, and can be accessed and printed from within the visitation management system. In some embodiments of the invention, rules can be configured in the visitation management system to flag certain keywords, phrases, or topics of conversations. These rules can be used to notify interested parties when a transcript meeting the rules is stored in the visitation management system (e.g., a rule that notifies a corrections officer whenever the terms “gang” and “cocaine” are both uttered in a visitation session).
-
FIG. 1 depicts a block diagram of avisitation management system 100 according to an embodiment of the invention, including the communications connections between the components thereof. Thevisitation control unit 102, which is depicted in further detail inFIG. 2 , is connected to each of the other components of the visitation management system. The visitation control unit may communicate via a local area network (LAN) 104 for local resources, such as data storage 106 (shown in further detail inFIG. 4 ),control stations 108,video communication devices 110, andaudio communication devices 112. The LAN may, but need not be, exclusively Ethernet technology, and thus may employ any type of communication medium and protocol, including analog, voltage based transmission. - Communication to remote visitation and audio devices is typically accomplished via the use of a LAN, commonly Ethernet or T1 digital framing, though other techniques are regarded as within the spirit and scope of the present invention. The wide area network (WAN) 114 provides a dedicated, private link between the visitation control unit and remote devices.
- The
Internet 116 can be utilized to provide access to remotely distributed control stations, schedulingclients 118, andhome visitation devices 120. The speed requirement of the Internet link is dependent on the number of simultaneous connections supported. - Referring now to
FIG. 2 , the visitation control unit is the central processing center for thevisitation management system 100. In some embodiments of the invention, the processing power for the visitation control unit comes from standard personal computer (PC) components, configured in a more robust and redundant server role. This generally means higher quality components, with redundant power supplies, hard drives, and other components, but a standard, off-the-shelf (e.g., consumer-grade) system could also be utilized. - The visitation management system is designed to work with a variety of hardware, such as Intel or AMD based processors, and Operating Systems, such as Microsoft Windows, Linux, Mac OS, and the like. The visitation management system itself is independent of the operating system in which it is operating. Each server depicted in
FIG. 2 can be construed as either a physical hardware device or a virtual server. The number of physical hardware machines can be scaled to match the number of simultaneous user connections desired in the visitation management system. Additionally, if space and/or power consumption are considerations, the visitation management system can be scaled down to reduce these concerns. - The servers that collectively make up the visitation control unit are typically each connected to a
central network bus 210, which will most commonly be an Ethernet connection. In addition, the entire visitation management system may be shielded from the rest of the network at an institution by a router or firewall, which can, of course, be either hardware or software based. - The
video server 212, of which there may be one or more, connects to each of the video visitation devices and performs the necessary electrical connections and switching required to connect two or more visitation station units together for a visitation session. The video server can also send the audio and/or video feed to any other computer or device coupled to the visitation control unit for monitoring, recording, or other purposes. Additionally, in some embodiments of the invention, the video server is capable of performing real time translation of video protocols to allow for different video visitation hardware to be utilized in different locations. One of ordinary skill in the art will recognize how the video server establishes a video conference between parties to a visitation session, including, in some instances, a monitoring party. - The
audio server 214, of which there may be one or several, is the audio analogue to the video server. The audio server connects audio devices, such as standard telephones, together and can send the output to any additional devices connected to the visitation control unit for monitoring, recording, or other reasons. The phone devices can be connected to the server via two wire copper connections, via twisted pair digital connections, wireless/cordless connections, or other techniques that will be familiar to one of ordinary skill. Preferably, the audio server has the capability to detect and respond to DTMF based events, flash hook events, and any other event that can be generated by a telephone device. The audio server may also be able to ring the telephone devices. The audio server may also be connected to outside telephone lines to route audio to an outside source, such as a land line or cellular phone. - The
web server 216 is typically a standard device, which may run Apache, Microsoft Internet Information Server, or other web server software. The primary function of the web server is to route requests and other communications from visitation control stations, remote visitation scheduling clients, and home visitation devices into the appropriate destination within the visitation control unit. The web server can also serve as a maintenance point into the visitation control unit for servicing and configuring the system. Typically, the web server will be connected to both the public Internet and the internal network of an organization (e.g., a private intranet). - The
application server 218 functions as the primary center of logic processing in the visitation management system. A block diagram of the application server is shown inFIG. 3 . The application server may be a common PC based machine with one or more CPU's 310 connected via abus 314 to other peripherals including, without limitation, anetwork card 316, analog modem 318,keyboard 320, mouse (not shown), and amonitor 322. Additionally, bothsystem memory 322, consisting of RAM, andother data storage 324, e.g., magnetic, optical, or flash memory may be connected to the bus. -
System memory 322 contains the runtime environment of the application server. While the preferred embodiment of the device contains an operating system 330 (e.g., Windows, Linux, or another operating system), and a Javavirtual machine 332, the visitation management system could also be implemented in a variety of software configurations without changing the purpose or functionality of the device. - Internal
non-volatile storage 324, preferably, but not necessarily, a hard drive, is used to store the operating system, application files, temporary files used during the operation of the system, and as a temporary storage space for recordings of visitation sessions. It is contemplated that recordings of visitation sessions will periodically be moved to another location, for example by an automated scheduled file transfer process, though recordings of visitation sessions may also be stored on the application server without departing from the spirit and scope of the present invention. - As shown in
FIG. 4 , in addition to the storage on the application server, there may also be one or more databases and associated Network Attached Storage (NAS) devices connected to the application server via the network. Although, as noted above, the term “database” is typically used herein to refer to a relational database, the term is also intended to encompass a relational database application or a remotely defined data store. - The remotely defined data store can be an external system, such as an Inmate Telephone System, an Offender Management System, or other information system application. In some embodiments of the invention, the data store is not a formal data store at all, but rather is a real time link to live data. In still other embodiments of the visitation management system, a variety of such data stores and databases are simultaneously employed in a heterogeneous environment.
- As described above, the database will typically provide access to a variety of different types of data records. For example, data related to an inmate, including name, commitment information, address, and the like may be linked to the majority of the remaining data types. Such identification records may be entered directly into the visitation management system or, alternatively, loaded from an external system such as an OMS or Inmate Telephone System.
- Scheduling data is typically generated only within the visitation management system and consists of visitation events that have not yet occurred (e.g., visitation schedule records) as well as historical visit information (e.g., visitation session records). A visitation schedule record may include links to all involved parties, including inmates, visitors, and correctional staff (if correctional staff are needed). It may also include links to other resources that will be used in the visitation session, such as inmate visitation booths, telephone reservations, data bandwidth guarantee reservations, as well as other metadata about the visitation session.
- A separate logical data store can be used to store visitation session records, which may include a link to the original visitation session reservation (e.g., the visitation schedule record), any recordings or transcripts of the visitation session, and a list of the actual resources used, if they differed from the resources originally reserved for the visitation session. The data is preferably stored in such a way as to facilitate long term storage and easy data reporting capabilities.
- A fourth type of database or data store may include configuration information for the visitation management system itself. As described above, this information may include the connection details of all the various hardware devices connected, such as the video and audio servers, web servers, application servers, and remote devices. The configuration data allows the system to be configured with a variety of different hardware types and manufacturers, enabling the application to run under a variety of different configurations depending on the needs and requirements of a given installation of the visitation management system.
- Additionally, a fifth data store is the Network Attached Storage (NAS) device that may be used to store the actual audio and/or video recordings of visitation sessions. While the NAS may be configured as a relational database, it is preferably configured as a mass storage device, and a pointer or other reference to the location of data stored on the NAS may be stored as part of a record in another database. The NAS is preferably a very large storage device that can be expanded as the need arises to accommodate more live (e.g., on-line) storage of visitation session data. Various settings can be configured as to the lifespan of the data contained within the NAS. An infinite lifespan of data will, of course, require an infinite amount of storage, so such controls are necessary to limit or reduce the size of the NAS required. The capability could also be provided to export visitation session data off the live storage mechanism into permanent off-line storage, such as optical media for archival purposes or for presenting as evidence in court or aiding in the investigation of criminal activity.
- Typically, standard analog inmate telephones are preferably used for audio communication during face to face and remote visitation sessions. They could also be used for video visitation sessions if the selected video communication device does not provide audio services. Unlike most existing visitation systems, the phones in the visitation management system according to the present invention are coupled to the audio server (e.g., the visitation control unit) rather than being directly connected to each other in pairs. In the case of standard analog phones, they will typically be connected to the server via a 66 block or other interface block. The phones, since they are not connected directly together, require the audio server to provide line power and logical switching services. In addition, because of the nature of this connection, the phones can easily be changed in real time to be connected to other devices. This advantageously increases the flexibility of the visitation management system, permitting such configurations as a many-to-many connection between telephones, while also providing a convenient controller (e.g., the visitation control unit).
- Further, it is contemplated that “smart” phones may be used instead of, or in addition to, analog phones, similarly connected over a network to the audio server. The addition of smart phones could facilitate implementation of additional features in the visitation management system, such as authentication of parties to a visitation session as described above (e.g., via biometric identification devices or card readers), payment services (e.g., via credit card readers for ‘for-pay’ visitations), or deposits into an inmate accounting system. Smart phones could also introduce additional interactive services, such as display readouts for elapsed and remaining times, or other information.
- In the case of a typical installation of visitation booths, a pair of phones would be installed in a visitation booth, one on each side of the divider between the inmate and the visitor. Unlike prior art systems, the phones used in the visitation management system of the present invention preferably are not connected for communication until the controlling hardware (e.g., the visitation control unit) and the audio/telephony software makes the connection, preferably after both the inmate and the visitor have authenticated themselves to the visitation session, either using a smart phone as described above or a separate authentication interface. This allows for precise timing of visits, authentication, and the ability to interrupt the visit by a third party.
- Video visitation devices may be connected in a similar manner as phone devices-that is, via a central video server incorporated into the visitation control unit, rather than directly together. One of ordinary skill in the art will recognize that the video devices function similarly to the audio devices. Of course, video conferencing stations can be located in the same building connected via a LAN, coupled across a relatively short distance (e.g., within the same town) via a WAN, or coupled across a much larger distance (e.g., across several states) via an extended WAN. Preferably, the video conferencing devices have the capability to split audio signals from video signals to transmit the two signals to two different devices. This capability is may be used, for example, when connecting from a dedicated video conference station that supports both audio and video to a remote web-cam for video transmission via the Internet and a standard telephone for audio transmission via telephone lines.
- Connected to the application server is a theoretically unlimited number of local client computers. The computers are running a local web browser, such as Microsoft's Internet Explorer, or Mozilla's Firefox. The browsers interpret user interactions and inputs and transmit these interactions and inputs to the application servers, where the interactions and inputs are used to control the audio and video servers. Clients are also able to administer the system, such as setting up resources and viewing, inserting, and deleting inmates or visitation sessions.
- Preferably, the web application also provides mechanisms to view the current state of the system. The “current state of the system” is all active visitation sessions happening within the visitation management system. The amount of data visible to the user may be limited by the user's role. For example, some corrections officers may be able to see only that an inmate is in a visitation session, while other corrections officers could see where the visit is occurring and what type of visitation session it is (e.g., telephonic, remote video, in person). Still other classes of users may be able to listen in on and/or view the visitation session, as well as terminate or extend the visitation session.
- As described above, the visitation management system may be part of a larger application, such as an Offender Management System or Inmate Telephone System, or it may be a standalone application depending on client configuration and modules installed. While the visitation management system is, in some embodiments, a web-based system, it is also contemplated that the functionality of the system can be delivered via a variety of application platforms, including, but not limited to, client/server or rich client.
- Optionally, a facility may provide access to the visitation management system via the Internet or other communication network. In this case, remote clients, typically also running web browsers such as Microsoft's Internet Explorer or Mozilla Firefox, will be able to access the visitation management system as though locally connected to the visitation management system. One potential user of a remote client might be an investigator, not located at the correctional facility, who is interested in all visitation sessions involving a particular inmate. This investigator could be notified automatically by the visitation management system when a visitation session is occurring, and the investigator can log on to the visitation management system from any Internet-connected remote location and device to view and/or listen to the visitation session in progress.
- This remote accessibility provides an advantage over the prior art, where an investigator ordinarily must rely on an alert correctional officer to take note of a visitation session of interest occurring and then notify the investigator of the date, time, booth, inmate, visitor, etc. that was involved in the visitation session. Thereafter, in order to listen to the content of the visitation session, the investigator would be required to search for the recording or transcript—if any—of the visitation session after the fact based on the reported date, time, and location of the visitation session. This method is time consuming, imprecise, error prone, and reactive. On the other hand, the inventive method disclosed herein is fast, accurate, precise, and proactive, which is a considerable improvement over the prior art.
- A special type of limited client access can also be provided to the general public in order to schedule and conduct visitation sessions via a home personal computer. In some embodiments of the invention, the visitor uses a web camera connected to the visitor's home PC, which is connected to the Internet. The individual logs on to the visitation management system via the world wide web to request and schedule visitation sessions, as well as to actually participate in a visitation session. Audio visitation sessions would work in a fashion similar to an inmate telephone call, though the visit is at a predetermined time and is mutually initiated. A video visitation session will use the web camera to transmit video, and the monitor will display video. Audio can be transmitted via a standard phone line or via computer speakers and microphone. These types of visitation sessions will also be able to be monitored, transcribed, and/or controlled from any other client connected to the visitation management system. The maximum number of simultaneous remote visitation sessions is controlled by available bandwidth coming from the facility, as well as the physical number of video or audio devices that exist. As an alternative to visitors utilizing their home PCs to connect to the visitation management system over the Internet, special dedicated terminals may be provided outside the correctional facility, but still within the correctional enterprise's network, to perform the same or similar functions.
- A significant advantage of the visitation management system is its ability to integrate with a variety of other solutions for the corrections market. Services can be provided to integrate directly at the database level, where inmates and other data can be moved seamlessly from one system to another (e.g., between an OMS and the visitation management system). Services can also exist to integrate at a higher level, such as the visitation management system sending messages on events occurring to external systems. For example, a visitation session involving a particular inmate may trigger a message to an outside system, such as an investigator, District Attorney, or court system. Integration may also exist to connect visitation management systems at several correctional facilities to allow for facility to facility visitation sessions.
-
FIGS. 5 and 6 are flowcharts of a visitation process using the visitation management system. Scheduling of a visitation session is initiated by either an inmate or by the visitor. The visitation session can be scheduled far in advance, and is made according to the operational rules of the correctional facility. For example, a correctional facility may require that an inmate only has three visitation sessions per month or that only approved visitors may participate in visitation sessions. Regardless of how the visit schedule is created (e.g., whether initiate by the inmate or initiated by the visitor), the operational rules are preferably enforced by the visitation management system to ensure that only compliant visitation sessions are scheduled. - If desired by the correctional facility, a visitor may initiate the scheduling process. Often times, a visitor must be approved before a visitation session can be scheduled. A visitor can place himself or herself on a waiting list to be approved by the facility if the visitor is not already on the list. Individual combinations of visitors and inmates may be approved. Alternatively, certain visitors may be approved to visit any inmate.
- Once a visitor has an inmate on the visitor's approved inmate list, the visitor can schedule a visitation session by browsing for available days and times. Available visitation sessions may be presented by taking into account the facility's visiting hours, the inmate's schedule, and other facility rules as reflected in the visitation schedule records. An option could also exist to auto-pick the first available time for a visitation session.
- Once a visitation session is scheduled, a record of the visitation session is created in the appropriate database or data store detailing at least the participants in the visit (e.g., the name of the inmate and the name, address, and phone number of the visitor), and, in some embodiments of the invention, the resources that will be required to participate in the visit, such as visitation booths, video devices, or room reservations. The visitor is notified of the confirmed visitation session date and time and may be given a confirmation code that uniquely identifies the scheduled visitation session. Preferably, once created, the scheduled visitation session can be modified by the inmate, the visitor, or an administrative individual. Modifications can include changes in date and/or time, resource changes, or a complete cancellation of the visitation session. Upon any change to the reservation, the visitor must be notified of the change. This can be done via email, postal mail, or via telephone. Likewise, the record of the visitation session may also be updated.
- Once the time arrives for the visitation session, both the inmate and the visitor must be located in the proper place for the visit. Often, the individuals involved in the visitation session, both inmate and visitor, must be positively identified by a corrections officer as well as authenticated to the visitation session as described herein. Generally, it is easy to positively identify an inmate, as inmates are required to have identification on them at all times. The inmate can further be positively identified by requiring a unique telephone or visitation session identification code to be entered into a phone or video device before the visitation session can proceed. Identifying individuals of the general public can be more problematic, but facility rules can be set up to require a state or federally issued identification card to be shown before the visitation session can commence. To further identify the individual, a unique one-time code can be generated that will only allow the visitor to participate in the visitation session the visitor was scheduled for. This helps prevent a common scenario where visitors try to circumvent facility rules to visit someone they are not permitted to visit. Additionally, identification and authentication can also be performed via biometric devices, such as fingerprint readers.
- Once both parties to the visitation session have been positively identified by the system, the visitation session can be said to have started. At this point, the visitation management system will initiate a timer to calculate the elapsed and remaining time of the visitation session.
- During the duration of the visitation session, any individual with the proper rights and privileges can view visitation sessions in progress, listen in on them, or speak to one or both parties to the visitation session. Appropriately credentialed users may also be able to terminate the visitation session or grant additional time to the parties. The visitation session may also be recorded so that individuals can review a recording and/or transcript of the visitation session at a later time.
- Towards the end of the visitation session, participants may be notified of the time remaining in the visitation session. A prompt, such as “You have 3 minutes remaining for this visit” can be played over a telephone or other audio device or overlaid on the screen for a video visit.
- At the conclusion of the visitation session, the visitation management system automatically terminates the logical device connections (e.g., the connection between telephone or video devices) to ensure that no further communication can take place between the inmate and the visitor. The visitation management system then creates a record of the completed visitation session as described herein. Of course, if desired, the system can start a transcription process to convert any recorded audio into searchable text.
- The inmate is escorted back to his or her cell, and the visitor can leave the facility at this point. The visitation booths are now available for use for other visitation sessions.
- After the visit has concluded, the visitation session record becomes available for retrieval at a later point by corrections officers, police officers, investigators, and others who may require access.
- The visitation management system according to the present invention advantageously allows for searching of past visitation sessions via such criteria as inmate name, visitor name, visitation session locations, dates and times, content of the visitation sessions (e.g., topics discussed), and unique visit IDs. Once the visitation management system is provided with the proper search input parameters from a user, the application server queries the database for results matching the user's request. The results will be formatted and presented back to the user, typically via the web browser. The user can then export the details of one or more of the output visitation sessions, or the audio and/or video of the visitation session, if available, to external media, such as CD or DVD. The media can be presented in court, if needed, to serve as evidence.
- Although several embodiments of this invention have been described above with a certain degree of particularity, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of this invention. For example, though the present invention has been generally been described in the context of a one-to-one visitation session, one of ordinary skill in the art will appreciate that the principles disclosed herein may also be applied to a one-to-many, many-to-one, or many-to-many visitation session. As such, the term “party,” as used herein, should not be construed to refer to only a single individual, but rather is intended to encompass one “side” of a visitation session (e.g., in a visitation session between an inmate and the inmate's family, the inmate is a party and the family is a party).
- It is intended that all matter contained in the above description or shown in the accompanying drawings shall be interpreted as illustrative only and not limiting. Changes in detail or structure may be made without departing from the spirit of the invention as defined in the appended claims.
Claims (34)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/819,834 US20080201158A1 (en) | 2007-02-15 | 2007-06-29 | System and method for visitation management in a controlled-access environment |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US90134207P | 2007-02-15 | 2007-02-15 | |
US11/819,834 US20080201158A1 (en) | 2007-02-15 | 2007-06-29 | System and method for visitation management in a controlled-access environment |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080201158A1 true US20080201158A1 (en) | 2008-08-21 |
Family
ID=39707413
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/819,834 Abandoned US20080201158A1 (en) | 2007-02-15 | 2007-06-29 | System and method for visitation management in a controlled-access environment |
US12/032,200 Active 2030-07-04 US8731934B2 (en) | 2007-02-15 | 2008-02-15 | System and method for multi-modal audio mining of telephone conversations |
US14/281,323 Active 2028-10-06 US9552417B2 (en) | 2007-02-15 | 2014-05-19 | System and method for multi-modal audio mining of telephone conversations |
US15/412,992 Active US10120919B2 (en) | 2007-02-15 | 2017-01-23 | System and method for multi-modal audio mining of telephone conversations |
US15/974,314 Active 2028-04-06 US10853384B2 (en) | 2007-02-15 | 2018-05-08 | System and method for multi-modal audio mining of telephone conversations |
US17/107,304 Active 2028-05-19 US11789966B2 (en) | 2007-02-15 | 2020-11-30 | System and method for multi-modal audio mining of telephone conversations |
US18/240,150 Pending US20240054142A1 (en) | 2007-02-15 | 2023-08-30 | System and method for multi-modal audio mining of telephone conversations |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/032,200 Active 2030-07-04 US8731934B2 (en) | 2007-02-15 | 2008-02-15 | System and method for multi-modal audio mining of telephone conversations |
US14/281,323 Active 2028-10-06 US9552417B2 (en) | 2007-02-15 | 2014-05-19 | System and method for multi-modal audio mining of telephone conversations |
US15/412,992 Active US10120919B2 (en) | 2007-02-15 | 2017-01-23 | System and method for multi-modal audio mining of telephone conversations |
US15/974,314 Active 2028-04-06 US10853384B2 (en) | 2007-02-15 | 2018-05-08 | System and method for multi-modal audio mining of telephone conversations |
US17/107,304 Active 2028-05-19 US11789966B2 (en) | 2007-02-15 | 2020-11-30 | System and method for multi-modal audio mining of telephone conversations |
US18/240,150 Pending US20240054142A1 (en) | 2007-02-15 | 2023-08-30 | System and method for multi-modal audio mining of telephone conversations |
Country Status (1)
Country | Link |
---|---|
US (7) | US20080201158A1 (en) |
Cited By (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090233584A1 (en) * | 2008-03-11 | 2009-09-17 | Disney Enterprises, Inc. | System and method for providing concierge services to a mobile device user |
US20100128104A1 (en) * | 2008-11-24 | 2010-05-27 | Innovatec Sl | Communication System for Remote Patient Visits and Clinical Status Monitoring |
US20100287251A1 (en) * | 2009-05-06 | 2010-11-11 | Futurewei Technologies, Inc. | System and Method for IMS Based Collaborative Services Enabling Multimedia Application Sharing |
US20110047473A1 (en) * | 2009-08-19 | 2011-02-24 | Core System (NI) Limited | Inmate information center for correctional facility processing |
US20110096139A1 (en) * | 2009-10-22 | 2011-04-28 | James Rudolf | System and Method for Providing Secure Video Visitation |
US20130002804A1 (en) * | 2005-10-31 | 2013-01-03 | At&T Corp. | Method and apparatus for providing high security video session |
US8542802B2 (en) | 2007-02-15 | 2013-09-24 | Global Tel*Link Corporation | System and method for three-way call detection |
US20130262521A1 (en) * | 2012-03-30 | 2013-10-03 | Atul Gupta | Mechanism for Multiple System Common Scheduling and Analysis of Unrelated Events in a Corrections Facility |
US8630726B2 (en) | 2009-02-12 | 2014-01-14 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US8648894B2 (en) | 2011-05-04 | 2014-02-11 | Eyconix, Llc | Virtual inmate visitation |
US8731934B2 (en) | 2007-02-15 | 2014-05-20 | Dsi-Iti, Llc | System and method for multi-modal audio mining of telephone conversations |
US20140218466A1 (en) * | 2012-12-21 | 2014-08-07 | Tw Vending, Inc. | Audio-video remote visitation telecommunications technology |
US9007420B1 (en) * | 2014-01-10 | 2015-04-14 | Securus Technologies, Inc. | Verifying presence of authorized persons during an electronic visitation |
US9077680B2 (en) | 2005-02-17 | 2015-07-07 | Core Systems (Ni) Limited | Offender message delivery system |
US9094569B1 (en) * | 2012-02-01 | 2015-07-28 | Gary James Humphries | Remote web-based visitation system for prisons |
US9106789B1 (en) * | 2012-01-20 | 2015-08-11 | Tech Friends, Inc. | Videoconference and video visitation security |
US20150340983A1 (en) * | 2010-01-08 | 2015-11-26 | Tigo Energy, Inc. | Systems and methods for an identification protocol between a local controller of a solar module and a master controller |
US9225838B2 (en) | 2009-02-12 | 2015-12-29 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US9225935B2 (en) | 2013-03-15 | 2015-12-29 | Intelmate Llc | Video communications in detention environments |
US9380082B1 (en) * | 2013-10-22 | 2016-06-28 | Securus Technologies, Inc. | Remote multi-party and/or event-driven visitation for residents of controlled-environment facilities |
CN105933868A (en) * | 2016-06-27 | 2016-09-07 | 合肥指南针电子科技有限责任公司 | Prison break prevention system for supervision |
US9558523B1 (en) * | 2016-03-23 | 2017-01-31 | Global Tel* Link Corp. | Secure nonscheduled video visitation system |
US9584252B1 (en) | 2015-09-25 | 2017-02-28 | Harris Corporation | Managed access system with mobile wireless device geolocation capability |
US9667763B1 (en) * | 2013-05-20 | 2017-05-30 | Securus Technologies, Inc. | Family communications in a controlled-environment facility |
US9681360B1 (en) * | 2016-05-13 | 2017-06-13 | Harris Corporation | Managed access system that provides selective communications and registration of mobile wireless devices |
US9723040B1 (en) * | 2015-09-02 | 2017-08-01 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US9736706B2 (en) | 2015-09-25 | 2017-08-15 | Harris Corporation | Managed access system with monitoring device to determine system operability |
US9763095B2 (en) | 2015-09-25 | 2017-09-12 | Harris Corporation | Managed access system that determines authorized and unauthorized mobile wireless devices |
US9769666B2 (en) | 2015-09-25 | 2017-09-19 | Harris Corporation | Managed access system with monitoring device to determine and change radio equipment |
US9800830B2 (en) | 2012-02-01 | 2017-10-24 | Homewav, Llc | Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party |
US9820150B2 (en) | 2015-09-25 | 2017-11-14 | Harris Corporation | Managed access system having filtered communications using network interface device |
US9924135B1 (en) * | 2013-02-11 | 2018-03-20 | Securus Technologies, Inc. | Rules-based systems and methods for video visitation |
US9923936B2 (en) | 2016-04-07 | 2018-03-20 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US9930042B2 (en) | 2016-03-15 | 2018-03-27 | Global Tel*Link Corporation | Controlled environment secure media streaming system |
US9930088B1 (en) | 2017-06-22 | 2018-03-27 | Global Tel*Link Corporation | Utilizing VoIP codec negotiation during a controlled environment call |
US9973810B2 (en) | 2016-05-06 | 2018-05-15 | Global Tel*Link Corp. | Controlled environment media and communication system |
US10015546B1 (en) | 2017-07-27 | 2018-07-03 | Global Tel*Link Corp. | System and method for audio visual content creation and publishing within a controlled environment |
US10027797B1 (en) | 2017-05-10 | 2018-07-17 | Global Tel*Link Corporation | Alarm control for inmate call monitoring |
US10122825B1 (en) | 2017-07-27 | 2018-11-06 | Global Tel*Link Corporation | Systems and methods for providing a visual content gallery within a controlled environment |
US10171680B1 (en) * | 2017-06-30 | 2019-01-01 | Global Tel*Link Corporation | Call processing system for modifying inmate communication limits |
US10225396B2 (en) | 2017-05-18 | 2019-03-05 | Global Tel*Link Corporation | Third party monitoring of a activity within a monitoring platform |
US10284559B2 (en) | 2016-05-13 | 2019-05-07 | Harris Corporation | Managed access system with security assessment equipment |
US10296784B2 (en) | 2014-01-10 | 2019-05-21 | Securus Technologies, Inc. | Verifying presence of a person during an electronic visitation |
US10296994B2 (en) * | 2016-02-11 | 2019-05-21 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US10321094B2 (en) | 2016-01-20 | 2019-06-11 | Global Tel*Link Corporation | Secure video visitation system |
US10405184B2 (en) | 2017-01-31 | 2019-09-03 | Harris Corporation | Mobile wireless device managed access system providing enhanced authentication features and related methods |
US10405007B2 (en) | 2017-07-27 | 2019-09-03 | Global Tel*Link Corporation | Systems and methods for a video sharing service within controlled environments |
US10565247B2 (en) | 2017-07-28 | 2020-02-18 | Global Tel*Link Corporation | Controlled environment secure media streaming system with digital video recording |
US10572961B2 (en) | 2016-03-15 | 2020-02-25 | Global Tel*Link Corporation | Detection and prevention of inmate to inmate message relay |
US10609089B1 (en) * | 2017-12-20 | 2020-03-31 | Securus Technologies, Inc. | Influencing the location of contraband wireless communications devices within controlled-environment facilities |
US10699810B2 (en) * | 2017-07-20 | 2020-06-30 | Kenneth W. STEWART | Employee visit verification system |
US10713743B1 (en) | 2013-11-01 | 2020-07-14 | Securus Technologies, Inc. | Management of visitation sessions for residents of controlled-environment facilities |
US10740861B1 (en) * | 2003-11-24 | 2020-08-11 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US10860786B2 (en) | 2017-06-01 | 2020-12-08 | Global Tel*Link Corporation | System and method for analyzing and investigating communication data from a controlled environment |
US10896622B2 (en) | 2017-06-20 | 2021-01-19 | Global Tel*Link Corporation | Educational content delivery system for controlled environments |
US10929941B1 (en) * | 2019-03-21 | 2021-02-23 | Securus Technologies, Llc | Controlled incarceration risk mitigation mechanisms for at risk constituents employing controlled-environment facility communications systems |
US10929940B1 (en) * | 2018-03-02 | 2021-02-23 | Securus Technologies, Llc | Controlled-environment facility message response system |
US11164151B2 (en) | 2017-07-20 | 2021-11-02 | Global Tel*Link Corporation | System and method for providing job-specific training and employment to residents of a controlled environment facility |
US11213754B2 (en) | 2017-08-10 | 2022-01-04 | Global Tel*Link Corporation | Video game center for a controlled environment facility |
US20220272131A1 (en) * | 2020-09-04 | 2022-08-25 | Puzzle Ai Co., Ltd. | Method, electronic device and system for generating record of telemedicine service |
US11611721B2 (en) | 2016-10-27 | 2023-03-21 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US11757958B1 (en) | 2015-09-02 | 2023-09-12 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
Families Citing this family (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7623648B1 (en) * | 2004-12-01 | 2009-11-24 | Tellme Networks, Inc. | Method and system of generating reference variations for directory assistance data |
US9477940B2 (en) * | 2007-07-23 | 2016-10-25 | International Business Machines Corporation | Relationship-centric portals for communication sessions |
US20090319187A1 (en) * | 2008-06-23 | 2009-12-24 | Outside.In, Inc. | Generating Geocoded Targeted Web Advertisements |
US8037070B2 (en) * | 2008-06-25 | 2011-10-11 | Yahoo! Inc. | Background contextual conversational search |
US8886663B2 (en) * | 2008-09-20 | 2014-11-11 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
US10504126B2 (en) * | 2009-01-21 | 2019-12-10 | Truaxis, Llc | System and method of obtaining merchant sales information for marketing or sales teams |
US10594870B2 (en) | 2009-01-21 | 2020-03-17 | Truaxis, Llc | System and method for matching a savings opportunity using census data |
US20110054912A1 (en) * | 2009-09-01 | 2011-03-03 | Christopher Anthony Silva | System and method of storing telephone conversations |
EP2299440B1 (en) * | 2009-09-11 | 2012-10-31 | Vodafone Holding GmbH | Method and Device for automatic recognition of given keywords and/or terms within voice data |
US20110076990A1 (en) * | 2009-09-29 | 2011-03-31 | Christopher Anthony Silva | Method for recording mobile phone calls |
US8428559B2 (en) | 2009-09-29 | 2013-04-23 | Christopher Anthony Silva | Method for recording mobile phone calls |
US20110228913A1 (en) * | 2010-03-16 | 2011-09-22 | Telcordia Technologies, Inc. | Automatic extraction of information from ongoing voice communication system and methods |
US9559869B2 (en) | 2010-05-04 | 2017-01-31 | Qwest Communications International Inc. | Video call handling |
US9356790B2 (en) | 2010-05-04 | 2016-05-31 | Qwest Communications International Inc. | Multi-user integrated task list |
US9501802B2 (en) * | 2010-05-04 | 2016-11-22 | Qwest Communications International Inc. | Conversation capture |
US8406390B1 (en) | 2010-08-23 | 2013-03-26 | Sprint Communications Company L.P. | Pausing a live teleconference call |
US9800721B2 (en) | 2010-09-07 | 2017-10-24 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
US8687776B1 (en) * | 2010-09-08 | 2014-04-01 | Mongoose Metrics, LLC | System and method to analyze human voice conversations |
US9031839B2 (en) * | 2010-12-01 | 2015-05-12 | Cisco Technology, Inc. | Conference transcription based on conference data |
US8719031B2 (en) | 2011-06-17 | 2014-05-06 | At&T Intellectual Property I, L.P. | Dynamic access to external media content based on speaker content |
US9324323B1 (en) * | 2012-01-13 | 2016-04-26 | Google Inc. | Speech recognition using topic-specific language models |
US9479642B2 (en) * | 2012-01-26 | 2016-10-25 | Zoom International S.R.O. | Enhanced quality monitoring |
US8775177B1 (en) | 2012-03-08 | 2014-07-08 | Google Inc. | Speech recognition process |
US9275139B2 (en) | 2012-03-30 | 2016-03-01 | Aurix Limited | “At least” operator for combining audio search hits |
EP2739024B1 (en) * | 2012-11-30 | 2017-01-04 | Alcatel Lucent | A method and a module for shifting a call established through a first application server in order to route it through a second application server |
US9460455B2 (en) * | 2013-01-04 | 2016-10-04 | 24/7 Customer, Inc. | Determining product categories by mining interaction data in chat transcripts |
US9264532B2 (en) * | 2013-01-31 | 2016-02-16 | International Business Machines Corporation | Technology for combating mobile phone criminal activity |
EP2763136B1 (en) * | 2013-02-04 | 2016-04-06 | Telefónica, S.A. | Method and system for obtaining relevant information from a voice communication |
US10498840B2 (en) * | 2013-03-15 | 2019-12-03 | Intelmate Llc | Method and system for efficient review of exchanged content |
US9020115B2 (en) | 2013-05-09 | 2015-04-28 | Hank Technology Llc | Inmate communications |
US9762462B2 (en) * | 2014-02-28 | 2017-09-12 | Verizon Patent And Licensing Inc. | Method and apparatus for providing an anti-bullying service |
US10237399B1 (en) | 2014-04-01 | 2019-03-19 | Securus Technologies, Inc. | Identical conversation detection method and apparatus |
US9621713B1 (en) | 2014-04-01 | 2017-04-11 | Securus Technologies, Inc. | Identical conversation detection method and apparatus |
KR102245098B1 (en) * | 2014-05-23 | 2021-04-28 | 삼성전자주식회사 | Mobile terminal and control method thereof |
US9990433B2 (en) | 2014-05-23 | 2018-06-05 | Samsung Electronics Co., Ltd. | Method for searching and device thereof |
US11314826B2 (en) | 2014-05-23 | 2022-04-26 | Samsung Electronics Co., Ltd. | Method for searching and device thereof |
US9922048B1 (en) * | 2014-12-01 | 2018-03-20 | Securus Technologies, Inc. | Automated background check via facial recognition |
US9300791B1 (en) * | 2014-12-11 | 2016-03-29 | Securus Technologies, Inc. | Controlled-environment facility resident communication detection |
US9799049B2 (en) * | 2014-12-15 | 2017-10-24 | Nuance Communications, Inc. | Enhancing a message by providing supplemental content in the message |
US9854087B1 (en) * | 2015-09-09 | 2017-12-26 | Securus Technologies, Inc. | Contraband wireless communications device identification in controlled-environment facilities |
US10236017B1 (en) * | 2015-09-29 | 2019-03-19 | Amazon Technologies, Inc. | Goal segmentation in speech dialogs |
US10394886B2 (en) * | 2015-12-04 | 2019-08-27 | Sony Corporation | Electronic device, computer-implemented method and computer program |
US10043517B2 (en) * | 2015-12-09 | 2018-08-07 | International Business Machines Corporation | Audio-based event interaction analytics |
US10511712B2 (en) * | 2016-08-19 | 2019-12-17 | Andrew Horton | Caller identification in a secure environment using voice biometrics |
US10224026B2 (en) * | 2016-03-15 | 2019-03-05 | Sony Corporation | Electronic device, system, method and computer program |
US10067933B2 (en) * | 2016-06-03 | 2018-09-04 | Babel Street, Inc. | Geospatial origin and identity based on dialect detection for text based media |
US10165073B1 (en) * | 2016-06-28 | 2018-12-25 | Securus Technologies, Inc. | Multiple controlled-environment facility investigative data aggregation and analysis system access to and use of social media data |
US20180011929A1 (en) * | 2016-07-08 | 2018-01-11 | Newvoicemedia, Ltd. | Concept-based search and categorization |
US10609094B1 (en) * | 2016-10-05 | 2020-03-31 | Securus Technologies, Inc. | Controlled-environment facility resident contact tools for intelligent controlled-environment facility resident communication and/or media device interfaces |
US10741197B2 (en) * | 2016-11-15 | 2020-08-11 | Amos Halava | Computer-implemented criminal intelligence gathering system and method |
US10074362B2 (en) * | 2017-01-31 | 2018-09-11 | Global Tel*Link Corporation | System and method for assessing security threats and criminal proclivities |
US9843448B1 (en) * | 2017-06-07 | 2017-12-12 | Global Tel*Link Corporation | System and method for customizing inmate communication notification |
US10091349B1 (en) | 2017-07-11 | 2018-10-02 | Vail Systems, Inc. | Fraud detection system and method |
US10623581B2 (en) | 2017-07-25 | 2020-04-14 | Vail Systems, Inc. | Adaptive, multi-modal fraud detection system |
WO2019044520A1 (en) | 2017-08-31 | 2019-03-07 | ヤマハ株式会社 | Information-providing method and information providing apparatus |
EP3528138A1 (en) * | 2018-02-14 | 2019-08-21 | Dr. Ing. h.c. F. Porsche AG | Method and apparatus for location recognition |
US10742799B2 (en) * | 2018-02-27 | 2020-08-11 | Leo Technologies, Llc | Automated speech-to-text processing and analysis of call data apparatuses, methods and systems |
US11176929B1 (en) * | 2018-06-21 | 2021-11-16 | Kerberos International, Inc. | Artificial intelligence (AI) language detection and translation system for scanning radio signals and rules-based transmission of alerts |
US10904297B1 (en) | 2019-06-17 | 2021-01-26 | Securas Technologies, LLC | Controlled-environment facility resident and associated non-resident telephone number investigative linkage to e-commerce application program purchases |
US11295020B2 (en) | 2019-08-05 | 2022-04-05 | Bank Of America Corporation | System for integrated natural language processing and event analysis for threat detection in computing systems |
US10958779B1 (en) | 2019-09-23 | 2021-03-23 | Capital One Services, Llc | Machine learning dataset generation using a natural language processing technique |
CN112052053B (en) * | 2020-10-10 | 2023-12-19 | 国科晋云技术有限公司 | Method and system for cleaning ore mining program in high-performance computing cluster |
US11640418B2 (en) * | 2021-06-25 | 2023-05-02 | Microsoft Technology Licensing, Llc | Providing responses to queries of transcripts using multiple indexes |
CN117076612B (en) * | 2023-08-31 | 2024-02-20 | 宁夏恒信创达数据科技有限公司 | Call center big data text mining system |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5634086A (en) * | 1993-03-12 | 1997-05-27 | Sri International | Method and apparatus for voice-interactive language instruction |
US5640490A (en) * | 1994-11-14 | 1997-06-17 | Fonix Corporation | User independent, real-time speech recognition system and method |
US5899972A (en) * | 1995-06-22 | 1999-05-04 | Seiko Epson Corporation | Interactive voice recognition method and apparatus using affirmative/negative content discrimination |
US20020002464A1 (en) * | 1999-08-31 | 2002-01-03 | Valery A. Petrushin | System and method for a telephonic emotion detection that provides operator feedback |
US20020010587A1 (en) * | 1999-08-31 | 2002-01-24 | Valery A. Pertrushin | System, method and article of manufacture for a voice analysis system that detects nervousness for preventing fraud |
US20020032566A1 (en) * | 1996-02-09 | 2002-03-14 | Eli Tzirkel-Hancock | Apparatus, method and computer readable memory medium for speech recogniton using dynamic programming |
US20030023444A1 (en) * | 1999-08-31 | 2003-01-30 | Vicki St. John | A voice recognition system for navigating on the internet |
US6633846B1 (en) * | 1999-11-12 | 2003-10-14 | Phoenix Solutions, Inc. | Distributed realtime speech recognition system |
US20040252184A1 (en) * | 2003-06-16 | 2004-12-16 | Hesse Thomas H. | Video visitation station |
US20050080625A1 (en) * | 1999-11-12 | 2005-04-14 | Bennett Ian M. | Distributed real time speech recognition system |
US20050114192A1 (en) * | 2003-11-26 | 2005-05-26 | Worldcom, Inc. | Inmate visitation scheduling and management |
US6907387B1 (en) * | 2002-08-05 | 2005-06-14 | Bellsouth Intellectual Property Corporation | Systems and methods for remote monitoring of a facility location |
US20050128283A1 (en) * | 2003-12-16 | 2005-06-16 | Bulriss Michael E. | Video conference system providing private and attorney-client privileged communications |
US20060064037A1 (en) * | 2004-09-22 | 2006-03-23 | Shalon Ventures Research, Llc | Systems and methods for monitoring and modifying behavior |
US20060087554A1 (en) * | 2004-10-25 | 2006-04-27 | Boyd Sandra L | Systems and processes for scheduling and conducting audio/video communications |
US20060200353A1 (en) * | 1999-11-12 | 2006-09-07 | Bennett Ian M | Distributed Internet Based Speech Recognition System With Natural Language Support |
US20070237099A1 (en) * | 2006-03-29 | 2007-10-11 | Microsoft Corporation | Decentralized architecture and protocol for voice conferencing |
US20080000966A1 (en) * | 2006-06-30 | 2008-01-03 | Evercom Systems, Inc. | System and method for electronic visitation registration |
US20080106370A1 (en) * | 2006-11-02 | 2008-05-08 | Viking Access Systems, Llc | System and method for speech-recognition facilitated communication to monitor and control access to premises |
US20080118045A1 (en) * | 2006-11-22 | 2008-05-22 | Evercom Sustems, Inc. | Systems And Methods For Visitation Terminal User Identification |
US20080201143A1 (en) * | 2007-02-15 | 2008-08-21 | Forensic Intelligence Detection Organization | System and method for multi-modal audio mining of telephone conversations |
US20080300878A1 (en) * | 1999-11-12 | 2008-12-04 | Bennett Ian M | Method For Transporting Speech Data For A Distributed Recognition System |
US7519169B1 (en) * | 2004-09-28 | 2009-04-14 | Evercom Systems, Inc. | Systems and methods for management and dissemination of information from a controlled environment facility |
Family Cites Families (299)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4054756A (en) | 1976-09-29 | 1977-10-18 | Bell Telephone Laboratories, Incorporated | Method and apparatus for automating special service call handling |
US4191860A (en) | 1978-07-13 | 1980-03-04 | Bell Telephone Laboratories, Incorporated | Data base communication call processing method |
JPS6010821Y2 (en) | 1979-11-05 | 1985-04-12 | 三信整熱工業株式会社 | Insulation tube manufacturing equipment |
CA1175521A (en) | 1980-04-09 | 1984-10-02 | David D. Falconer | Echo cancellation in two-wire full-duplex data transmission with estimation of far-end data components |
JPS59225626A (en) | 1983-06-06 | 1984-12-18 | Nippon Telegr & Teleph Corp <Ntt> | Echo canceller device for data transmitter |
JPS6010821A (en) | 1983-06-30 | 1985-01-21 | Fujitsu Ltd | Adaptive echo cancellor |
US4670628A (en) | 1984-04-19 | 1987-06-02 | Boratgis James P | Reprogrammable call forwarding device |
JPS61135239A (en) | 1984-12-06 | 1986-06-23 | Matsushita Electric Ind Co Ltd | Echo canceller |
JPS61135239U (en) | 1985-02-13 | 1986-08-23 | ||
US4691347A (en) | 1985-02-15 | 1987-09-01 | American Telephone And Telegraph Company, At&T Bell Laboratories | Method and apparatus for controlling a conference |
US4918719A (en) | 1986-10-08 | 1990-04-17 | American Telephone And Telegraph Company | Elimination of false requests for telephone operator assistance |
IT1215490B (en) | 1987-05-14 | 1990-02-14 | Sgs Microelettronica Spa | METHOD OF ATTENUATION OF THE ECHO SIGNAL IN CONVERSION CIRCUITS, SO CALLED BY TELEPHONE FORKS, INTENDED FOR TELEPHONE CONFERENCES, AND EQUIPMENT OPERATING ACCORDING TO SUCH METHOD. |
US4813070A (en) | 1987-11-19 | 1989-03-14 | Royal Technology, Inc. | Telephone intercept system |
US4995030A (en) | 1988-02-01 | 1991-02-19 | Memotec Datacom, Inc. | Far end echo cancellation method and apparatus |
US4935956A (en) | 1988-05-02 | 1990-06-19 | Telequip Ventures, Inc. | Automated public phone control for charge and collect billing |
US4943973A (en) | 1989-03-31 | 1990-07-24 | At&T Company | Spread-spectrum identification signal for communications system |
JPH0365826A (en) | 1989-08-04 | 1991-03-20 | Nec Corp | Echo eliminator |
US5185781A (en) | 1990-10-12 | 1993-02-09 | At&T Bell Laboratories | Automation of telephone operator assistance calls |
JP2725218B2 (en) | 1990-12-21 | 1998-03-11 | 株式会社リコス | Distributed teleconferencing controller |
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
US5210789A (en) | 1991-06-28 | 1993-05-11 | International Telecharge, Inc. | Interactive telephone operator terminal |
US5345501A (en) | 1991-07-15 | 1994-09-06 | Bell Atlantic Network Services, Inc. | Telephone central office based method of and system for processing customer orders |
AU3238793A (en) | 1991-12-12 | 1993-07-19 | Cellular Technical Services Company, Inc. | Real-time information system for cellular telephones |
US5319735A (en) | 1991-12-17 | 1994-06-07 | Bolt Beranek And Newman Inc. | Embedded signalling |
US5646940A (en) | 1992-05-04 | 1997-07-08 | Novi International, Inc. | System for simultaneous analog and digital communications over an analog channel |
US5539812A (en) | 1992-07-29 | 1996-07-23 | Kitchin; Dwight W. | Method and apparatus for detecting an attempted three-way conference call on a remote telephone |
US5319702A (en) | 1992-07-29 | 1994-06-07 | Tele-Matic Corporation | Method and apparatus for detecting and responding to hook flash events occurring on a remote telephone |
US5721788A (en) | 1992-07-31 | 1998-02-24 | Corbis Corporation | Method and system for digital image signatures |
SE518247C2 (en) | 1992-08-28 | 2002-09-17 | Ericsson Telefon Ab L M | Software structure for a telecommunications system |
CA2105034C (en) | 1992-10-09 | 1997-12-30 | Biing-Hwang Juang | Speaker verification with cohort normalized scoring |
JP3065826B2 (en) | 1992-11-11 | 2000-07-17 | 株式会社いすゞセラミックス研究所 | Control device for high compression ratio engine for vaporized fuel |
US5345595A (en) | 1992-11-12 | 1994-09-06 | Coral Systems, Inc. | Apparatus and method for detecting fraudulent telecommunication activity |
US5379345A (en) | 1993-01-29 | 1995-01-03 | Radio Audit Systems, Inc. | Method and apparatus for the processing of encoded data in conjunction with an audio broadcast |
US5420910B1 (en) | 1993-06-29 | 1998-02-17 | Airtouch Communications Inc | Method and apparatus for fraud control in cellular telephone systems utilizing rf signature comparison |
US5485507A (en) | 1993-08-20 | 1996-01-16 | Gateway Technologies, Inc. | Integrated commissary system |
US5535261A (en) | 1993-08-20 | 1996-07-09 | Gateway Technologies, Inc. | Selectively activated integrated real-time recording of telephone conversations |
AU693462B2 (en) | 1993-09-22 | 1998-07-02 | E-Talk Corporation | Method and system for automatically monitoring the performance quality of call center service representatives |
JP2986345B2 (en) | 1993-10-18 | 1999-12-06 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Voice recording indexing apparatus and method |
US5469370A (en) | 1993-10-29 | 1995-11-21 | Time Warner Entertainment Co., L.P. | System and method for controlling play of multiple audio tracks of a software carrier |
US5710834A (en) | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US6983051B1 (en) | 1993-11-18 | 2006-01-03 | Digimarc Corporation | Methods for audio watermarking and decoding |
US5822436A (en) | 1996-04-25 | 1998-10-13 | Digimarc Corporation | Photographic products and methods employing embedded information |
US5748783A (en) | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5841886A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Security system for photographic identification |
US5832119C1 (en) | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
US5636292C1 (en) | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
US5841978A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Network linking method using steganographically embedded data objects |
DE69434237T2 (en) | 1993-11-18 | 2005-12-08 | Digimarc Corp., Tualatin | Video with hidden in-band digital data |
US5768426A (en) | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US6122403A (en) | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US5862260A (en) | 1993-11-18 | 1999-01-19 | Digimarc Corporation | Methods for surveying dissemination of proprietary empirical data |
US5748763A (en) | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
DE69532394T2 (en) | 1994-02-10 | 2004-11-04 | Nippon Telegraph And Telephone Corp. | Method and device for echo cancellation using the "fast projection scheme" |
US5425091A (en) | 1994-02-28 | 1995-06-13 | U S West Technologies, Inc. | Method and system for providing an automatic customer callback service |
US5438616A (en) | 1994-03-02 | 1995-08-01 | Peoples; John T. | Method and apparatus for storing telephone numbers and for automatically calling the stored numbers |
US5655013A (en) | 1994-04-19 | 1997-08-05 | Gainsboro; Jay L. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US5926533A (en) * | 1994-04-19 | 1999-07-20 | Opus Telecom, Inc. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US20010036821A1 (en) | 1994-04-19 | 2001-11-01 | Jay L. Gainsboro | Computer-based method and apparatus for controlling, monitoring, recording and reporting wireless communications |
US7106843B1 (en) | 1994-04-19 | 2006-09-12 | T-Netix, Inc. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US5832068A (en) | 1994-06-01 | 1998-11-03 | Davox Corporation | Data processing system with real time priority updating of data records and dynamic record exclusion |
US5502762A (en) | 1994-06-10 | 1996-03-26 | Andrew; Brian J. | System and method for simultaneously controlling ringing at local and remote telephones |
US5590171A (en) | 1994-07-07 | 1996-12-31 | Bellsouth Corporation | Method and apparatus for communications monitoring |
US5535194A (en) | 1994-07-14 | 1996-07-09 | Motorola, Inc. | Method and apparatus for echo canceling with double-talk immunity |
CA2159384C (en) | 1994-10-18 | 1998-09-22 | Barry H. Freedman | Method for processing collect telephone calls |
IL115892A (en) | 1994-11-10 | 1999-05-09 | British Telecomm | Interference detection system for telecommunications |
US5745569A (en) | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
JPH08191346A (en) | 1995-01-11 | 1996-07-23 | Nec Corp | Subscriber speech monitor system |
US7133845B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | System and methods for secure transaction management and electronic rights protection |
DE69637733D1 (en) | 1995-02-13 | 2008-12-11 | Intertrust Tech Corp | SYSTEMS AND METHOD FOR SAFE TRANSMISSION |
US5774452A (en) | 1995-03-14 | 1998-06-30 | Aris Technologies, Inc. | Apparatus and method for encoding and decoding information in audio signals |
US5583925A (en) | 1995-03-22 | 1996-12-10 | Lucent Technologies, Inc. | Automatic three-way calling feature for a telecommunications system |
US5907602A (en) | 1995-03-30 | 1999-05-25 | British Telecommunications Public Limited Company | Detecting possible fraudulent communication usage |
US5749066A (en) | 1995-04-24 | 1998-05-05 | Ericsson Messaging Systems Inc. | Method and apparatus for developing a neural network for phoneme recognition |
US5793415A (en) | 1995-05-15 | 1998-08-11 | Imagetel International Inc. | Videoconferencing and multimedia system |
US5592548A (en) | 1995-05-31 | 1997-01-07 | Qualcomm Incorporated | System and method for avoiding false convergence in the presence of tones in a time-domain echo cancellation process |
DE19520232C1 (en) | 1995-06-01 | 1996-08-14 | Siemens Ag | Sequence coding for ASCII text encryption |
US5613004A (en) | 1995-06-07 | 1997-03-18 | The Dice Company | Steganographic method and device |
US5619561A (en) | 1995-06-22 | 1997-04-08 | Reese; Morris | Call-waiting and caller identification with three-way conversations arrangements |
JP2856113B2 (en) | 1995-07-10 | 1999-02-10 | 日本電気株式会社 | Echo canceller |
CA2184949C (en) | 1995-09-28 | 2000-05-30 | Ingemar J. Cox | Secure spread spectrum watermarking for multimedia data |
US5745558A (en) | 1995-10-27 | 1998-04-28 | United States Advanced Network, Inc. | Three-way call detection and response system |
US5805685A (en) | 1995-11-15 | 1998-09-08 | Gateway Technologies, Inc. | Three way call detection by counting signal characteristics |
US5796811A (en) | 1995-11-15 | 1998-08-18 | Gateway Technologies, Inc. | Three way call detection |
US5719937A (en) | 1995-12-06 | 1998-02-17 | Solana Technology Develpment Corporation | Multi-media copy management system |
US6052454A (en) | 1996-01-16 | 2000-04-18 | Global Tel*Link Corp. | Telephone apparatus with recording of phone conversations on massive storage |
US7092494B1 (en) | 1996-01-16 | 2006-08-15 | Global Tel★Link Corporation | Telephone system |
US5822432A (en) | 1996-01-17 | 1998-10-13 | The Dice Company | Method for human-assisted random key generation and application for digital watermark system |
US6205249B1 (en) | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
US5867562A (en) | 1996-04-17 | 1999-02-02 | Scherer; Gordon F. | Call processing system with call screening |
US20030040326A1 (en) | 1996-04-25 | 2003-02-27 | Levy Kenneth L. | Wireless methods and devices employing steganography |
US5768355A (en) | 1996-05-16 | 1998-06-16 | Science Dynamics Corporation | Three-way call detection system |
US5889868A (en) | 1996-07-02 | 1999-03-30 | The Dice Company | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data |
US5835486A (en) | 1996-07-11 | 1998-11-10 | Dsc/Celcore, Inc. | Multi-channel transcoder rate adapter having low delay and integral echo cancellation |
US6308171B1 (en) | 1996-07-30 | 2001-10-23 | Carlos De La Huerga | Method and system for automated data storage and retrieval |
US5953049A (en) | 1996-08-02 | 1999-09-14 | Lucent Technologies Inc. | Adaptive audio delay control for multimedia conferencing |
US5923746A (en) | 1996-09-18 | 1999-07-13 | Rockwell International Corp. | Call recording system and method for use with a telephonic switch |
AU4390697A (en) | 1996-09-25 | 1998-04-17 | British Telecommunications Public Limited Company | Apparatus for communications service provision |
US5861810C1 (en) | 1996-09-27 | 2001-02-27 | Interactive Systems Llc | System and method for providing crime victims updated informations and emergency alert notices |
US5915001A (en) | 1996-11-14 | 1999-06-22 | Vois Corporation | System and method for providing and using universally accessible voice and speech data files |
US6263507B1 (en) | 1996-12-05 | 2001-07-17 | Interval Research Corporation | Browser for use in navigating a body of information, with particular application to browsing information represented by audiovisual data |
US6035034A (en) | 1996-12-20 | 2000-03-07 | Telefonaktiebolaget L M Ericsson (Publ) | Double talk and echo path change detection in a telephony system |
US6654060B1 (en) * | 1997-01-07 | 2003-11-25 | Canon Kabushiki Kaisha | Video-image control apparatus and method and storage medium |
US6175831B1 (en) | 1997-01-17 | 2001-01-16 | Six Degrees, Inc. | Method and apparatus for constructing a networking database and system |
US5920834A (en) | 1997-01-31 | 1999-07-06 | Qualcomm Incorporated | Echo canceller with talk state determination to control speech processor functional elements in a digital telephone system |
US6078645A (en) | 1997-02-20 | 2000-06-20 | Lucent Technologies Inc. | Apparatus and method for monitoring full duplex data communications |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6038315A (en) | 1997-03-17 | 2000-03-14 | The Regents Of The University Of California | Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy |
US5999828A (en) | 1997-03-19 | 1999-12-07 | Qualcomm Incorporated | Multi-user wireless telephone having dual echo cancellers |
US6141406A (en) | 1997-03-27 | 2000-10-31 | T-Netix, Inc. | Method and apparatus for detecting a secondary destination of a telephone call based on changes in the telephone signal path |
US6173284B1 (en) | 1997-05-20 | 2001-01-09 | University Of Charlotte City Of Charlotte | Systems, methods and computer program products for automatically monitoring police records for a crime profile |
ATE247340T1 (en) | 1997-06-18 | 2003-08-15 | Clarity L L C | METHOD AND DEVICE FOR BLINDLY SEPARATION OF SIGNALS |
GB2327173B (en) | 1997-07-09 | 2002-05-22 | Ibm | Voice recognition of telephone conversations |
US6052462A (en) | 1997-07-10 | 2000-04-18 | Tellabs Operations, Inc. | Double talk detection and echo control circuit |
US6078807A (en) | 1997-08-26 | 2000-06-20 | International Business Machines Corporation | Telephony fraud detection using voice recognition techniques |
US6011849A (en) | 1997-08-28 | 2000-01-04 | Syndata Technologies, Inc. | Encryption-based selection system for steganography |
US6782370B1 (en) | 1997-09-04 | 2004-08-24 | Cendant Publishing, Inc. | System and method for providing recommendation of goods or services based on recorded purchasing history |
US6118860A (en) | 1997-09-12 | 2000-09-12 | Nortel Networks Corporation | Public communications services vending method and apparatus |
US5937035A (en) | 1997-09-15 | 1999-08-10 | Lucent Technologies Inc. | Interswitch telephone status monitoring |
US5991373A (en) | 1997-09-15 | 1999-11-23 | Teknekron Infoswitch Corporation | Reproduction of a voice and video session |
US6850609B1 (en) | 1997-10-28 | 2005-02-01 | Verizon Services Corp. | Methods and apparatus for providing speech recording and speech transcription services |
US5960080A (en) * | 1997-11-07 | 1999-09-28 | Justsystem Pittsburgh Research Center | Method for transforming message containing sensitive information |
US6064963A (en) | 1997-12-17 | 2000-05-16 | Opus Telecom, L.L.C. | Automatic key word or phrase speech recognition for the corrections industry |
US6336093B2 (en) | 1998-01-16 | 2002-01-01 | Avid Technology, Inc. | Apparatus and method using speech recognition and scripts to capture author and playback synchronized audio and video |
US6324650B1 (en) | 1998-03-16 | 2001-11-27 | John W.L. Ogilvie | Message content protection and conditional disclosure |
US6160903A (en) | 1998-04-24 | 2000-12-12 | Dew Engineering And Development Limited | Method of providing secure user access |
US6243480B1 (en) | 1998-04-30 | 2001-06-05 | Jian Zhao | Digital authentication with analog documents |
US6381321B1 (en) | 1998-05-04 | 2002-04-30 | T-Netix, Inc. | Telecommunication resource allocation system and method |
US20010043697A1 (en) | 1998-05-11 | 2001-11-22 | Patrick M. Cox | Monitoring of and remote access to call center activity |
US6233347B1 (en) | 1998-05-21 | 2001-05-15 | Massachusetts Institute Of Technology | System method, and product for information embedding using an ensemble of non-intersecting embedding generators |
US6314192B1 (en) | 1998-05-21 | 2001-11-06 | Massachusetts Institute Of Technology | System, method, and product for information embedding using an ensemble of non-intersecting embedding generators |
US6054928A (en) | 1998-06-04 | 2000-04-25 | Lemelson Jerome H. | Prisoner tracking and warning system and corresponding methods |
DE19841166A1 (en) | 1998-09-09 | 2000-03-16 | Deutsche Telekom Ag | Procedure for controlling the access authorization for voice telephony on a landline or mobile phone connection and communication network |
US7274928B2 (en) | 1998-10-02 | 2007-09-25 | Telespree Communications | Portable cellular phone system having automatic initialization |
US6665376B1 (en) | 1998-10-23 | 2003-12-16 | T-Netix, Inc. | Selectively activated integrated real-time recording of telephone conversations with automated documentation of consent to call recording |
US6898612B1 (en) | 1998-11-12 | 2005-05-24 | Sarnoff Corporation | Method and system for on-line blind source separation |
US7133511B2 (en) | 1998-12-11 | 2006-11-07 | Securelogix Corporation | Telephony security system |
US6243676B1 (en) | 1998-12-23 | 2001-06-05 | Openwave Systems Inc. | Searching and retrieving multimedia information |
US6526380B1 (en) | 1999-03-26 | 2003-02-25 | Koninklijke Philips Electronics N.V. | Speech recognition system having parallel large vocabulary recognition engines |
JP2000286737A (en) * | 1999-03-30 | 2000-10-13 | Kokusai Electric Co Ltd | Amplifier |
US6421645B1 (en) | 1999-04-09 | 2002-07-16 | International Business Machines Corporation | Methods and apparatus for concurrent speech recognition, speaker segmentation and speaker classification |
US6345252B1 (en) | 1999-04-09 | 2002-02-05 | International Business Machines Corporation | Methods and apparatus for retrieving audio information using content and speaker information |
US6312911B1 (en) | 1999-05-06 | 2001-11-06 | Frank Carter Bancroft | DNA-based steganography |
CA2388385A1 (en) | 1999-05-15 | 2000-11-23 | John W.L. Ogilvie | Automatic broker tools and techniques |
US6249570B1 (en) | 1999-06-08 | 2001-06-19 | David A. Glowny | System and method for recording and storing telephone call information |
US6671292B1 (en) | 1999-06-25 | 2003-12-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and system for adaptive voice buffering |
JP3065826U (en) | 1999-07-16 | 2000-02-08 | 日東河川工業株式会社 | Drain recovery device for rubber weir |
US6219640B1 (en) | 1999-08-06 | 2001-04-17 | International Business Machines Corporation | Methods and apparatus for audio-visual speaker recognition and utterance verification |
US6665644B1 (en) * | 1999-08-10 | 2003-12-16 | International Business Machines Corporation | Conversational data mining |
US6463415B2 (en) | 1999-08-31 | 2002-10-08 | Accenture Llp | 69voice authentication system and method for regulating border crossing |
US6763099B1 (en) | 1999-11-05 | 2004-07-13 | T-Netix, Inc. | Advanced three way call detection system and method using spread spectrum techniques |
US20020069084A1 (en) | 2000-01-03 | 2002-06-06 | Donovan John K. | Method and system for countering terrorism and monitoring visitors from abroad |
GB0000735D0 (en) | 2000-01-13 | 2000-03-08 | Eyretel Ltd | System and method for analysing communication streams |
US6760697B1 (en) | 2000-01-25 | 2004-07-06 | Minds And Technology, Inc. | Centralized processing of digital speech data originated at the network clients of a set of servers |
US6411683B1 (en) * | 2000-02-09 | 2002-06-25 | At&T Corp. | Automated telephone call designation system |
US6542602B1 (en) * | 2000-02-14 | 2003-04-01 | Nice Systems Ltd. | Telephone call monitoring system |
AU2001245927A1 (en) | 2000-03-24 | 2001-10-08 | Dragon Systems, Inc. | Lexical analysis of telephone conversations with call center agents |
US6647096B1 (en) * | 2000-04-11 | 2003-11-11 | Telequip Labs, Inc. | System and method for remotely controlling automated call placement call monitoring functions |
US7010617B2 (en) * | 2000-05-02 | 2006-03-07 | Sun Microsystems, Inc. | Cluster configuration repository |
US6211783B1 (en) | 2000-05-04 | 2001-04-03 | Randall Wang | Action control process of security alarm system |
US6389293B1 (en) | 2000-05-09 | 2002-05-14 | Cidco Communications Llc | Method and apparatus for providing call screening on cordless telephone equipment using three-way calling |
US6748356B1 (en) | 2000-06-07 | 2004-06-08 | International Business Machines Corporation | Methods and apparatus for identifying unknown speakers using a hierarchical tree structure |
US6668044B1 (en) * | 2000-07-19 | 2003-12-23 | Xtend Communications Corp. | System and method for recording telephonic communications |
US6697858B1 (en) | 2000-08-14 | 2004-02-24 | Telephony@Work | Call center |
US6636591B1 (en) | 2000-08-17 | 2003-10-21 | Evercom Systems, Inc. | System and method for affecting inmate conduct with good behavior discount telephone rates |
US6639977B1 (en) | 2000-08-17 | 2003-10-28 | Evercom Systems, Inc. | System and method for reverse billing of a telephone call |
US7075919B1 (en) | 2000-08-22 | 2006-07-11 | Cisco Technology, Inc. | System and method for providing integrated voice, video and data to customer premises over a single network |
ATE348990T1 (en) * | 2000-08-23 | 2007-01-15 | Univ Virginia | AUTOMATED FREEZER STORAGE AND REMOVAL DEVICE AND CORRESPONDING METHOD |
AU2001290822A1 (en) | 2000-09-11 | 2002-03-26 | Digimarc Corporation | Authenticating and measuring quality of service of multimedia signals using digital watermark analyses |
US7236932B1 (en) | 2000-09-12 | 2007-06-26 | Avaya Technology Corp. | Method of and apparatus for improving productivity of human reviewers of automatically transcribed documents generated by media conversion systems |
GB2368177A (en) | 2000-10-17 | 2002-04-24 | Ncr Int Inc | A financial transaction system |
US6668045B1 (en) | 2000-10-30 | 2003-12-23 | T-Netix, Inc. | Message screening, delivery and billing system |
US20020078042A1 (en) * | 2000-12-19 | 2002-06-20 | Telefonaktiebolaget L M Ericsson (Pub1) | System and method for determining affinity relationships |
US6625261B2 (en) | 2000-12-20 | 2003-09-23 | Southwestern Bell Communications Services, Inc. | Method, system and article of manufacture for bookmarking voicemail messages |
US20020107871A1 (en) | 2001-02-05 | 2002-08-08 | Knowledge Computing Corporation | Method and system for database migration and association |
US7191133B1 (en) | 2001-02-15 | 2007-03-13 | West Corporation | Script compliance using speech recognition |
US6970554B1 (en) | 2001-03-05 | 2005-11-29 | Verizon Corporate Services Group Inc. | System and method for observing calls to a call center |
US6788772B2 (en) | 2001-03-07 | 2004-09-07 | Zvi Barak | System and method for controlling outgoing telephone calls |
US7599351B2 (en) | 2001-03-20 | 2009-10-06 | Verizon Business Global Llc | Recursive query for communications network data |
US7103549B2 (en) | 2001-03-22 | 2006-09-05 | Intel Corporation | Method for improving speech recognition performance using speaker and channel information |
US7039700B2 (en) | 2001-04-04 | 2006-05-02 | Chatguard.Com | System and method for monitoring and analyzing communications |
US6751607B2 (en) | 2001-04-04 | 2004-06-15 | Thomas A. Kraay | System and method for the identification of latent relationships amongst data elements in large databases |
US7039585B2 (en) | 2001-04-10 | 2006-05-02 | International Business Machines Corporation | Method and system for searching recorded speech and retrieving relevant segments |
US6995664B1 (en) | 2001-06-20 | 2006-02-07 | Jeffrey Darling | Remote supervision system and method |
US20030002639A1 (en) | 2001-07-02 | 2003-01-02 | Huie David L. | Real-time call validation system |
US7505406B1 (en) | 2001-07-13 | 2009-03-17 | Evercom Systems, Inc. | Public telephone control with voice over internet protocol transmission |
US7899167B1 (en) | 2003-08-15 | 2011-03-01 | Securus Technologies, Inc. | Centralized call processing |
US7380279B2 (en) | 2001-07-16 | 2008-05-27 | Lenel Systems International, Inc. | System for integrating security and access for facilities and information systems |
US7953219B2 (en) | 2001-07-19 | 2011-05-31 | Nice Systems, Ltd. | Method apparatus and system for capturing and analyzing interaction based content |
EP1280137B1 (en) | 2001-07-24 | 2004-12-29 | Sony International (Europe) GmbH | Method for speaker identification |
US6614884B2 (en) | 2001-08-17 | 2003-09-02 | Jung Kee Jang | Automatic home alarm system and method |
US7079636B1 (en) | 2001-09-21 | 2006-07-18 | Evercom Systems, Inc. | Three-way telephone call prevention system and method |
US20030070076A1 (en) | 2001-10-05 | 2003-04-10 | Michael Kenneth W. | System and method for providing personal information about criminal offenders to a plurality of law enforcement agencies |
US6895086B2 (en) | 2001-11-13 | 2005-05-17 | Inmate Telephone, Inc. | 3-Way call detection system and method |
US20030099337A1 (en) | 2001-11-27 | 2003-05-29 | Lord H. Michael | Method and apparatus for exchanging data between a primary computer system and an external computer system to ensure transactional reconciliation between the systems |
US7032007B2 (en) | 2001-12-05 | 2006-04-18 | International Business Machines Corporation | Apparatus and method for monitoring instant messaging accounts |
US6639978B2 (en) | 2001-12-17 | 2003-10-28 | Evercom Systems, Inc. | Method for determining an entity responsible for billing a called party |
US7039171B2 (en) | 2001-12-24 | 2006-05-02 | Mci, Llc | Method and system for call tracking to discover inmate-employee fraternization |
US7085359B2 (en) | 2001-12-24 | 2006-08-01 | Mci, Llc | Investigation and reporting of inmate security threats |
US7424715B1 (en) | 2002-01-28 | 2008-09-09 | Verint Americas Inc. | Method and system for presenting events associated with recorded data exchanged between a server and a user |
US7047296B1 (en) | 2002-01-28 | 2006-05-16 | Witness Systems, Inc. | Method and system for selectively dedicating resources for recording data exchanged between entities attached to a network |
US6688518B1 (en) | 2002-01-31 | 2004-02-10 | Anthony Valencia | Wall-mounted touch screen information system |
US7046779B2 (en) | 2002-02-15 | 2006-05-16 | Multimedia Telesys, Inc. | Video conference system and methods for use at multi-station sites |
US7406039B2 (en) | 2002-02-26 | 2008-07-29 | Dell Products L.P. | System and method for a failover protocol in storage area network controllers |
US20030190045A1 (en) | 2002-04-03 | 2003-10-09 | Huberman Bernardo A. | Apparatus and method for protecting privacy while revealing data |
US8135115B1 (en) | 2006-11-22 | 2012-03-13 | Securus Technologies, Inc. | System and method for multi-channel recording |
US7079637B1 (en) | 2003-04-22 | 2006-07-18 | Evercom Systems, Inc. | System and method for detecting unauthorized call activity |
US7698182B2 (en) | 2002-04-29 | 2010-04-13 | Evercom Systems, Inc. | Optimizing profitability in business transactions |
US7860222B1 (en) | 2003-11-24 | 2010-12-28 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US7494061B2 (en) | 2006-06-30 | 2009-02-24 | Evercom Systems, Inc. | Systems and methods for identity verification using continuous biometric monitoring |
US6836540B2 (en) | 2002-04-29 | 2004-12-28 | Evercom Systems, Inc. | Systems and methods for offering a service to a party associated with a blocked call |
US20040008828A1 (en) * | 2002-07-09 | 2004-01-15 | Scott Coles | Dynamic information retrieval system utilizing voice recognition |
GB2391373A (en) * | 2002-07-31 | 2004-02-04 | David Toms | A system for the automatic detection of a fraudulent transaction |
US7333798B2 (en) | 2002-08-08 | 2008-02-19 | Value Added Communications, Inc. | Telecommunication call management and monitoring system |
US7886359B2 (en) | 2002-09-18 | 2011-02-08 | Symantec Corporation | Method and apparatus to report policy violations in messages |
US7050918B2 (en) | 2002-10-07 | 2006-05-23 | Lecroy Corporation | Digital group delay compensator |
US7133828B2 (en) * | 2002-10-18 | 2006-11-07 | Ser Solutions, Inc. | Methods and apparatus for audio data analysis and data mining using speech recognition |
US7076427B2 (en) * | 2002-10-18 | 2006-07-11 | Ser Solutions, Inc. | Methods and apparatus for audio data monitoring and evaluation using speech recognition |
US6810480B1 (en) | 2002-10-21 | 2004-10-26 | Sprint Communications Company L.P. | Verification of identity and continued presence of computer users |
US7133831B2 (en) | 2002-10-23 | 2006-11-07 | International Business Machines Corporation | System and method for processing personal telephony recorder commands |
US6947525B2 (en) | 2002-12-20 | 2005-09-20 | Lucent Technologies Inc. | Monitoring system for a remote telephone station |
US7730407B2 (en) | 2003-02-28 | 2010-06-01 | Fuji Xerox Co., Ltd. | Systems and methods for bookmarking live and recorded multimedia documents |
US7366782B2 (en) | 2003-04-14 | 2008-04-29 | At&T Corp. | Systems and methods for termination of session initiation protocol |
US6914772B2 (en) | 2003-06-16 | 2005-07-05 | Multimedia Telesys, Inc. | Video conference system enclosure |
JP2005010691A (en) * | 2003-06-20 | 2005-01-13 | P To Pa:Kk | Apparatus and method for speech recognition, apparatus and method for conversation control, and program therefor |
US20050010411A1 (en) * | 2003-07-09 | 2005-01-13 | Luca Rigazio | Speech data mining for call center management |
CA2534767A1 (en) | 2003-08-05 | 2005-03-17 | Inmate Telephone, Inc. | Three-way call detection using steganography |
US7529357B1 (en) * | 2003-08-15 | 2009-05-05 | Evercom Systems, Inc. | Inmate management and call processing systems and methods |
GB2407681B (en) | 2003-10-29 | 2007-02-28 | Vecommerce Ltd | Voice recognition system and method |
US7133512B2 (en) | 2003-10-30 | 2006-11-07 | International Business Machines Corporation | Conference call aggregation using an interactive voice response system |
US20050102371A1 (en) | 2003-11-07 | 2005-05-12 | Emre Aksu | Streaming from a server to a client |
US20070244690A1 (en) * | 2003-11-21 | 2007-10-18 | Koninklijke Philips Electronic, N.V. | Clustering of Text for Structuring of Text Documents and Training of Language Models |
US7551732B2 (en) | 2003-12-08 | 2009-06-23 | Global Tel*Link Corporation | Centralized voice over IP recording and retrieval method and apparatus |
US9288000B2 (en) * | 2003-12-17 | 2016-03-15 | International Business Machines Corporation | Monitoring a communication and retrieving information relevant to the communication |
US20130179949A1 (en) | 2004-01-22 | 2013-07-11 | Jpay, Inc. | Secure exchange of digital content |
US20100299761A1 (en) | 2004-01-22 | 2010-11-25 | Jpay, Inc. | System and method for sending electronic data to inmates |
KR100612839B1 (en) * | 2004-02-18 | 2006-08-18 | 삼성전자주식회사 | Method and apparatus for domain-based dialog speech recognition |
JP2005269347A (en) | 2004-03-19 | 2005-09-29 | Nec Personal Products Co Ltd | Multipoint conference system using ip network, and configuration method thereof |
US7062286B2 (en) | 2004-04-05 | 2006-06-13 | Motorola, Inc. | Conversion of calls from an ad hoc communication network |
US20050256746A1 (en) * | 2004-05-14 | 2005-11-17 | Zaleski John R | System for managing recorded audio medical information |
US7639791B2 (en) | 2004-05-21 | 2009-12-29 | Value-Added Communications, Inc. | Means and method for detecting three-way call attempts |
US7672845B2 (en) | 2004-06-22 | 2010-03-02 | International Business Machines Corporation | Method and system for keyword detection using voice-recognition |
US8064580B1 (en) | 2004-09-03 | 2011-11-22 | Confinement Telephony Technology, Llc | Telephony system and method with improved fraud control |
US7496345B1 (en) | 2004-09-30 | 2009-02-24 | Evercom Systems, Inc. | Systems and methods for processing calls directed to telephones having a portable interface |
KR100689396B1 (en) * | 2004-10-29 | 2007-03-02 | 삼성전자주식회사 | Apparatus and method of managing call history using speech recognition |
US7742581B2 (en) | 2004-11-24 | 2010-06-22 | Value-Added Communications, Inc. | Electronic messaging exchange |
US7280816B2 (en) | 2004-12-23 | 2007-10-09 | Agere Systems Inc. | Techniques for monitoring mobile telecommunications for shared accounts |
US20060198504A1 (en) | 2005-01-21 | 2006-09-07 | Shemisa Yousef O | Call recording platform |
US7783021B2 (en) | 2005-01-28 | 2010-08-24 | Value-Added Communications, Inc. | Digital telecommunications call management and monitoring system |
US8243891B2 (en) | 2005-01-28 | 2012-08-14 | Value-Added Communications, Inc. | Voice message exchange |
US7742582B2 (en) | 2005-02-17 | 2010-06-22 | Core Systems (Ni) Limited | Offender message delivery system |
US7386105B2 (en) | 2005-05-27 | 2008-06-10 | Nice Systems Ltd | Method and apparatus for fraud detection |
US9300790B2 (en) | 2005-06-24 | 2016-03-29 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
US7848510B2 (en) | 2005-07-22 | 2010-12-07 | Cisco Technology, Inc. | Method and system for recording automatic call distributor calls |
US20070047734A1 (en) | 2005-08-26 | 2007-03-01 | Sbc Knowledge Ventures, L.P. | Inmate telephone absent an inmate-accessible hook switch button |
US7596498B2 (en) * | 2005-09-02 | 2009-09-29 | Microsoft Corporation | Monitoring, mining, and classifying electronically recordable conversations |
US20070133437A1 (en) | 2005-12-13 | 2007-06-14 | Wengrovitz Michael S | System and methods for enabling applications of who-is-speaking (WIS) signals |
US8164461B2 (en) | 2005-12-30 | 2012-04-24 | Healthsense, Inc. | Monitoring task performance |
CA2536976A1 (en) | 2006-02-20 | 2007-08-20 | Diaphonics, Inc. | Method and apparatus for detecting speaker change in a voice transaction |
US20070195703A1 (en) | 2006-02-22 | 2007-08-23 | Living Independently Group Inc. | System and method for monitoring a site using time gap analysis |
US7804941B2 (en) | 2006-06-30 | 2010-09-28 | Securus Technologies, Inc. | Systems and methods for message delivery in a controlled environment facility |
US9892650B2 (en) | 2006-09-11 | 2018-02-13 | Houghton Mifflin Harcourt Publishing Company | Recovery of polled data after an online test platform failure |
US7822605B2 (en) | 2006-10-19 | 2010-10-26 | Nice Systems Ltd. | Method and apparatus for large population speaker identification in telephone interactions |
US8031052B2 (en) | 2006-11-22 | 2011-10-04 | Securus Technologies, Inc. | Systems and methods for radio frequency identification |
US7961860B1 (en) | 2006-11-22 | 2011-06-14 | Securus Technologies, Inc. | Systems and methods for graphically displaying and analyzing call treatment operations |
US8542802B2 (en) | 2007-02-15 | 2013-09-24 | Global Tel*Link Corporation | System and method for three-way call detection |
US8949266B2 (en) | 2007-03-07 | 2015-02-03 | Vlingo Corporation | Multiple web-based content category searching in mobile search application |
US8886663B2 (en) | 2008-09-20 | 2014-11-11 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
US8630726B2 (en) | 2009-02-12 | 2014-01-14 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US8458732B2 (en) | 2009-08-19 | 2013-06-04 | Core Systems (Ni) Limited | Inmate information center for correctional facility processing |
US10672286B2 (en) | 2010-03-14 | 2020-06-02 | Kryterion, Inc. | Cloud based test environment |
WO2011137279A2 (en) | 2010-04-30 | 2011-11-03 | Safe Communications, Inc. | E-mail, text, and message monitoring system and method |
US8926335B2 (en) | 2010-05-12 | 2015-01-06 | Verificient Technologies, Inc. | System and method for remote test administration and monitoring |
US9800721B2 (en) | 2010-09-07 | 2017-10-24 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
US9332014B2 (en) | 2011-04-05 | 2016-05-03 | Securus Technologies, Inc. | Distribution of broadcast content to controlled-environment facilities |
US9030292B2 (en) | 2011-04-18 | 2015-05-12 | Telmate, Llc | Interactive audio/video system and device for use in a secure facility |
US8498937B1 (en) | 2011-11-11 | 2013-07-30 | Tech Friends, Inc. | Managing financial accounts associated with residents of controlled-environment facilities |
US20130124192A1 (en) | 2011-11-14 | 2013-05-16 | Cyber360, Inc. | Alert notifications in an online monitoring system |
US9124763B2 (en) | 2012-02-01 | 2015-09-01 | Homewav, Llc | Method and apparatus for providing both audio/video visitation and VOIP telephonic visitation originated either by an inmate or by an outside visitor directly between inmates of a prison and an outside visitor without need of intervention by prison personnel |
US9621504B2 (en) | 2012-04-04 | 2017-04-11 | Intelmate Llc | Method and system for secure social networking on feature phones |
US9247200B2 (en) | 2013-03-14 | 2016-01-26 | Keefe Group, Llc | Controlled environment facility video visitation systems and methods |
US8917848B2 (en) | 2013-03-15 | 2014-12-23 | Telmate, Llc | Call management for secure facilities |
US10003698B2 (en) | 2013-03-15 | 2018-06-19 | Intelmate Llc | Method and system for financing of inmate mobile devices |
US10706132B2 (en) | 2013-03-22 | 2020-07-07 | Nok Nok Labs, Inc. | System and method for adaptive user authentication |
US9307386B2 (en) | 2013-03-22 | 2016-04-05 | Global Tel*Link Corporation | Multifunction wireless device |
US9020115B2 (en) | 2013-05-09 | 2015-04-28 | Hank Technology Llc | Inmate communications |
US9728073B2 (en) | 2013-12-18 | 2017-08-08 | Sdb Ip Holdings, Llc | Plumbing control system with distress signal |
US9692718B2 (en) | 2014-01-30 | 2017-06-27 | World Emergency Network—Nevada, Ltd. | Inmate communication system |
US9552684B2 (en) | 2014-02-04 | 2017-01-24 | Secure Gravity Inc. | Methods and systems configured to detect and guarantee identity for the purpose of data protection and access control |
US9621713B1 (en) | 2014-04-01 | 2017-04-11 | Securus Technologies, Inc. | Identical conversation detection method and apparatus |
US9094500B1 (en) | 2014-07-02 | 2015-07-28 | Securus Technologies, Inc. | Controlled communication between residents of controlled-environment facilities |
US8929525B1 (en) | 2014-07-03 | 2015-01-06 | Securus Technologies, Inc. | On-demand video communication for controlled-environment facility residents |
US20160191484A1 (en) | 2014-07-09 | 2016-06-30 | Intelmate Llc | Secure Inmate Digital Storage |
US9959777B2 (en) | 2014-08-22 | 2018-05-01 | Intelligent Technologies International, Inc. | Secure testing device, system and method |
US20160224538A1 (en) | 2015-01-30 | 2016-08-04 | First Advantage Litigation Consulting Dba Consilio | Systems and methods for electronic document review |
US20160373909A1 (en) | 2015-06-17 | 2016-12-22 | Hive Life, LLC | Wireless audio, security communication and home automation |
US20160371756A1 (en) | 2015-06-19 | 2016-12-22 | T-Mobile, Usa, Inc. | Seamless sharing of customer support chat sessions |
US10572961B2 (en) | 2016-03-15 | 2020-02-25 | Global Tel*Link Corporation | Detection and prevention of inmate to inmate message relay |
US9558523B1 (en) | 2016-03-23 | 2017-01-31 | Global Tel* Link Corp. | Secure nonscheduled video visitation system |
US9609121B1 (en) | 2016-04-07 | 2017-03-28 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
-
2007
- 2007-06-29 US US11/819,834 patent/US20080201158A1/en not_active Abandoned
-
2008
- 2008-02-15 US US12/032,200 patent/US8731934B2/en active Active
-
2014
- 2014-05-19 US US14/281,323 patent/US9552417B2/en active Active
-
2017
- 2017-01-23 US US15/412,992 patent/US10120919B2/en active Active
-
2018
- 2018-05-08 US US15/974,314 patent/US10853384B2/en active Active
-
2020
- 2020-11-30 US US17/107,304 patent/US11789966B2/en active Active
-
2023
- 2023-08-30 US US18/240,150 patent/US20240054142A1/en active Pending
Patent Citations (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5634086A (en) * | 1993-03-12 | 1997-05-27 | Sri International | Method and apparatus for voice-interactive language instruction |
US5640490A (en) * | 1994-11-14 | 1997-06-17 | Fonix Corporation | User independent, real-time speech recognition system and method |
US5899972A (en) * | 1995-06-22 | 1999-05-04 | Seiko Epson Corporation | Interactive voice recognition method and apparatus using affirmative/negative content discrimination |
US20020032566A1 (en) * | 1996-02-09 | 2002-03-14 | Eli Tzirkel-Hancock | Apparatus, method and computer readable memory medium for speech recogniton using dynamic programming |
US20030023444A1 (en) * | 1999-08-31 | 2003-01-30 | Vicki St. John | A voice recognition system for navigating on the internet |
US20020010587A1 (en) * | 1999-08-31 | 2002-01-24 | Valery A. Pertrushin | System, method and article of manufacture for a voice analysis system that detects nervousness for preventing fraud |
US20020002464A1 (en) * | 1999-08-31 | 2002-01-03 | Valery A. Petrushin | System and method for a telephonic emotion detection that provides operator feedback |
US20080300878A1 (en) * | 1999-11-12 | 2008-12-04 | Bennett Ian M | Method For Transporting Speech Data For A Distributed Recognition System |
US6633846B1 (en) * | 1999-11-12 | 2003-10-14 | Phoenix Solutions, Inc. | Distributed realtime speech recognition system |
US20070185717A1 (en) * | 1999-11-12 | 2007-08-09 | Bennett Ian M | Method of interacting through speech with a web-connected server |
US20050080625A1 (en) * | 1999-11-12 | 2005-04-14 | Bennett Ian M. | Distributed real time speech recognition system |
US20060200353A1 (en) * | 1999-11-12 | 2006-09-07 | Bennett Ian M | Distributed Internet Based Speech Recognition System With Natural Language Support |
US20080021708A1 (en) * | 1999-11-12 | 2008-01-24 | Bennett Ian M | Speech recognition system interactive agent |
US20050144004A1 (en) * | 1999-11-12 | 2005-06-30 | Bennett Ian M. | Speech recognition system interactive agent |
US6907387B1 (en) * | 2002-08-05 | 2005-06-14 | Bellsouth Intellectual Property Corporation | Systems and methods for remote monitoring of a facility location |
US20040252184A1 (en) * | 2003-06-16 | 2004-12-16 | Hesse Thomas H. | Video visitation station |
US20050114192A1 (en) * | 2003-11-26 | 2005-05-26 | Worldcom, Inc. | Inmate visitation scheduling and management |
US20050128283A1 (en) * | 2003-12-16 | 2005-06-16 | Bulriss Michael E. | Video conference system providing private and attorney-client privileged communications |
US20060064037A1 (en) * | 2004-09-22 | 2006-03-23 | Shalon Ventures Research, Llc | Systems and methods for monitoring and modifying behavior |
US7519169B1 (en) * | 2004-09-28 | 2009-04-14 | Evercom Systems, Inc. | Systems and methods for management and dissemination of information from a controlled environment facility |
US7256816B2 (en) * | 2004-10-25 | 2007-08-14 | 3V Technologies Incorporated | Systems and processes for scheduling and conducting audio/video communications |
US20060087555A1 (en) * | 2004-10-25 | 2006-04-27 | 3V Technologies Incorporated | Systems and processes for scheduling and conducting audio/video communications |
US20060087554A1 (en) * | 2004-10-25 | 2006-04-27 | Boyd Sandra L | Systems and processes for scheduling and conducting audio/video communications |
US20070237099A1 (en) * | 2006-03-29 | 2007-10-11 | Microsoft Corporation | Decentralized architecture and protocol for voice conferencing |
US7417983B2 (en) * | 2006-03-29 | 2008-08-26 | Microsoft Corporation | Decentralized architecture and protocol for voice conferencing |
US20080000966A1 (en) * | 2006-06-30 | 2008-01-03 | Evercom Systems, Inc. | System and method for electronic visitation registration |
US20080106370A1 (en) * | 2006-11-02 | 2008-05-08 | Viking Access Systems, Llc | System and method for speech-recognition facilitated communication to monitor and control access to premises |
US20080118045A1 (en) * | 2006-11-22 | 2008-05-22 | Evercom Sustems, Inc. | Systems And Methods For Visitation Terminal User Identification |
US20080201143A1 (en) * | 2007-02-15 | 2008-08-21 | Forensic Intelligence Detection Organization | System and method for multi-modal audio mining of telephone conversations |
Cited By (141)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10740861B1 (en) * | 2003-11-24 | 2020-08-11 | Securus Technologies, Inc. | Systems and methods for acquiring, accessing, and analyzing investigative information |
US9525656B2 (en) | 2005-02-17 | 2016-12-20 | Core Systems (Ni) Limited | Offender message delivery system |
US9077680B2 (en) | 2005-02-17 | 2015-07-07 | Core Systems (Ni) Limited | Offender message delivery system |
US8836752B2 (en) * | 2005-10-31 | 2014-09-16 | At&T Intellectual Property Ii, L.P. | Method and apparatus for providing high security video session |
US20130002804A1 (en) * | 2005-10-31 | 2013-01-03 | At&T Corp. | Method and apparatus for providing high security video session |
US9552417B2 (en) | 2007-02-15 | 2017-01-24 | Global Tel*Link Corp. | System and method for multi-modal audio mining of telephone conversations |
US11895266B2 (en) | 2007-02-15 | 2024-02-06 | Dsi-Iti, Inc. | System and method for three-way call detection |
US10120919B2 (en) | 2007-02-15 | 2018-11-06 | Global Tel*Link Corporation | System and method for multi-modal audio mining of telephone conversations |
US11258899B2 (en) | 2007-02-15 | 2022-02-22 | Dsi-Iti, Inc. | System and method for three-way call detection |
US9621732B2 (en) | 2007-02-15 | 2017-04-11 | Dsi-Iti, Llc | System and method for three-way call detection |
US10853384B2 (en) | 2007-02-15 | 2020-12-01 | Global Tel*Link Corporation | System and method for multi-modal audio mining of telephone conversations |
US9930173B2 (en) | 2007-02-15 | 2018-03-27 | Dsi-Iti, Llc | System and method for three-way call detection |
US8542802B2 (en) | 2007-02-15 | 2013-09-24 | Global Tel*Link Corporation | System and method for three-way call detection |
US10601984B2 (en) | 2007-02-15 | 2020-03-24 | Dsi-Iti, Llc | System and method for three-way call detection |
US8942356B2 (en) | 2007-02-15 | 2015-01-27 | Dsi-Iti, Llc | System and method for three-way call detection |
US11789966B2 (en) | 2007-02-15 | 2023-10-17 | Global Tel*Link Corporation | System and method for multi-modal audio mining of telephone conversations |
US8731934B2 (en) | 2007-02-15 | 2014-05-20 | Dsi-Iti, Llc | System and method for multi-modal audio mining of telephone conversations |
US8428509B2 (en) * | 2008-03-11 | 2013-04-23 | Disney Enterprises, Inc. | System and method for providing a rich media visitor log |
US20090233584A1 (en) * | 2008-03-11 | 2009-09-17 | Disney Enterprises, Inc. | System and method for providing concierge services to a mobile device user |
US20090233543A1 (en) * | 2008-03-11 | 2009-09-17 | Disney Enterprises, Inc. | System and method for providing a rich media visitor log |
US20090234935A1 (en) * | 2008-03-11 | 2009-09-17 | Disney Enterprises, Inc. | System and method for managing distribution of rich media content |
US8745165B2 (en) | 2008-03-11 | 2014-06-03 | Disney Enterprises, Inc. | System and method for managing distribution of rich media content |
US8472924B2 (en) | 2008-03-11 | 2013-06-25 | Disney Enterprises, Inc. | System and method for providing concierge services to a mobile device user |
US8305423B2 (en) * | 2008-11-24 | 2012-11-06 | Innovatec, S.L. | Communication system for remote patient visits and clinical status monitoring |
US20100128104A1 (en) * | 2008-11-24 | 2010-05-27 | Innovatec Sl | Communication System for Remote Patient Visits and Clinical Status Monitoring |
US9225838B2 (en) | 2009-02-12 | 2015-12-29 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US10057398B2 (en) | 2009-02-12 | 2018-08-21 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US8630726B2 (en) | 2009-02-12 | 2014-01-14 | Value-Added Communications, Inc. | System and method for detecting three-way call circumvention attempts |
US20100287251A1 (en) * | 2009-05-06 | 2010-11-11 | Futurewei Technologies, Inc. | System and Method for IMS Based Collaborative Services Enabling Multimedia Application Sharing |
US8458732B2 (en) * | 2009-08-19 | 2013-06-04 | Core Systems (Ni) Limited | Inmate information center for correctional facility processing |
US20110047473A1 (en) * | 2009-08-19 | 2011-02-24 | Core System (NI) Limited | Inmate information center for correctional facility processing |
US9043813B2 (en) | 2009-08-19 | 2015-05-26 | Core Systems (Ni) Limited | Inmate information center for correctional facility processing |
US9596247B2 (en) | 2009-08-19 | 2017-03-14 | Core Systems (Ni) Limited | Inmate information center for correctional facility processing |
US20110096139A1 (en) * | 2009-10-22 | 2011-04-28 | James Rudolf | System and Method for Providing Secure Video Visitation |
US10135385B2 (en) * | 2010-01-08 | 2018-11-20 | Tigo Energy, Inc. | Identification protocol between a local controller of a solar module and a master controller |
US10749457B2 (en) * | 2010-01-08 | 2020-08-18 | Tigo Energy, Inc. | Systems and methods for an identification protocol between a local controller of a solar module and a master controller |
US20150340983A1 (en) * | 2010-01-08 | 2015-11-26 | Tigo Energy, Inc. | Systems and methods for an identification protocol between a local controller of a solar module and a master controller |
US8648894B2 (en) | 2011-05-04 | 2014-02-11 | Eyconix, Llc | Virtual inmate visitation |
US9106789B1 (en) * | 2012-01-20 | 2015-08-11 | Tech Friends, Inc. | Videoconference and video visitation security |
US11856325B2 (en) | 2012-02-01 | 2023-12-26 | Homewav, Llc | Inmate device and user interface for inmate initiated video visitation system |
US9800830B2 (en) | 2012-02-01 | 2017-10-24 | Homewav, Llc | Method and apparatus for providing secured per-call adminstration, management, and control of communications between a secured party and a remote party |
US9094569B1 (en) * | 2012-02-01 | 2015-07-28 | Gary James Humphries | Remote web-based visitation system for prisons |
US9609269B2 (en) | 2012-02-01 | 2017-03-28 | Homewav, Llc | Remote web-based visitation system for prisons |
US9723262B1 (en) | 2012-02-01 | 2017-08-01 | Homewav, Llc | Inmate initiated web-based audio-video visitor visitation method and system |
US10313632B2 (en) | 2012-02-01 | 2019-06-04 | Homewav, Llc | Method and system providing inmate text-initiated web-based audio-video secured visitor visitation |
US9483756B2 (en) * | 2012-03-30 | 2016-11-01 | Advanced Technologies Group, Inc. | Mechanism for multiple system common scheduling and analysis of unrelated events in a corrections facility |
US20130262521A1 (en) * | 2012-03-30 | 2013-10-03 | Atul Gupta | Mechanism for Multiple System Common Scheduling and Analysis of Unrelated Events in a Corrections Facility |
US20140218466A1 (en) * | 2012-12-21 | 2014-08-07 | Tw Vending, Inc. | Audio-video remote visitation telecommunications technology |
US9288439B2 (en) * | 2012-12-21 | 2016-03-15 | Tw Vending, Inc. | Audio-video remote visitation telecommunications technology |
US9924135B1 (en) * | 2013-02-11 | 2018-03-20 | Securus Technologies, Inc. | Rules-based systems and methods for video visitation |
US9225935B2 (en) | 2013-03-15 | 2015-12-29 | Intelmate Llc | Video communications in detention environments |
US9948886B2 (en) | 2013-03-15 | 2018-04-17 | Intelmate Llc | Video communications in detention environments |
US10116458B2 (en) | 2013-05-20 | 2018-10-30 | Securus Technologies, Inc. | Family communications in a controlled-environment facility |
US9667763B1 (en) * | 2013-05-20 | 2017-05-30 | Securus Technologies, Inc. | Family communications in a controlled-environment facility |
US9380082B1 (en) * | 2013-10-22 | 2016-06-28 | Securus Technologies, Inc. | Remote multi-party and/or event-driven visitation for residents of controlled-environment facilities |
US10713743B1 (en) | 2013-11-01 | 2020-07-14 | Securus Technologies, Inc. | Management of visitation sessions for residents of controlled-environment facilities |
US9007420B1 (en) * | 2014-01-10 | 2015-04-14 | Securus Technologies, Inc. | Verifying presence of authorized persons during an electronic visitation |
US10296784B2 (en) | 2014-01-10 | 2019-05-21 | Securus Technologies, Inc. | Verifying presence of a person during an electronic visitation |
US11201899B1 (en) * | 2015-09-02 | 2021-12-14 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US11757958B1 (en) | 2015-09-02 | 2023-09-12 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US9979760B1 (en) * | 2015-09-02 | 2018-05-22 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US9723040B1 (en) * | 2015-09-02 | 2017-08-01 | Confinement Telephony Technology, Llc | Systems and methods for secure, controlled virtual visitation with confinement institution inmates |
US9820150B2 (en) | 2015-09-25 | 2017-11-14 | Harris Corporation | Managed access system having filtered communications using network interface device |
US9584252B1 (en) | 2015-09-25 | 2017-02-28 | Harris Corporation | Managed access system with mobile wireless device geolocation capability |
US9736706B2 (en) | 2015-09-25 | 2017-08-15 | Harris Corporation | Managed access system with monitoring device to determine system operability |
US9763095B2 (en) | 2015-09-25 | 2017-09-12 | Harris Corporation | Managed access system that determines authorized and unauthorized mobile wireless devices |
US9769666B2 (en) | 2015-09-25 | 2017-09-19 | Harris Corporation | Managed access system with monitoring device to determine and change radio equipment |
US10897596B2 (en) | 2016-01-20 | 2021-01-19 | Global Tel*Link Corporation | Secure video visitation system |
US10321094B2 (en) | 2016-01-20 | 2019-06-11 | Global Tel*Link Corporation | Secure video visitation system |
US11838685B2 (en) | 2016-01-20 | 2023-12-05 | Global Tel*Link Corporation | Secure video visitation system |
US11405583B2 (en) | 2016-01-20 | 2022-08-02 | Global Tel*Link Corporation | Secure video visitation system |
US10853901B2 (en) * | 2016-02-11 | 2020-12-01 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US20230025565A1 (en) * | 2016-02-11 | 2023-01-26 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US11854105B2 (en) * | 2016-02-11 | 2023-12-26 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US20190272610A1 (en) * | 2016-02-11 | 2019-09-05 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US11334958B2 (en) * | 2016-02-11 | 2022-05-17 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US10296994B2 (en) * | 2016-02-11 | 2019-05-21 | Global Tel*Link Corporation | System and method for visitation management in a controlled environment |
US10270777B2 (en) | 2016-03-15 | 2019-04-23 | Global Tel*Link Corporation | Controlled environment secure media streaming system |
US11238553B2 (en) | 2016-03-15 | 2022-02-01 | Global Tel*Link Corporation | Detection and prevention of inmate to inmate message relay |
US10572961B2 (en) | 2016-03-15 | 2020-02-25 | Global Tel*Link Corporation | Detection and prevention of inmate to inmate message relay |
US10673856B2 (en) | 2016-03-15 | 2020-06-02 | Global Tel*Link Corporation | Controlled environment secure media streaming system |
US11640644B2 (en) | 2016-03-15 | 2023-05-02 | Global Tel* Link Corporation | Detection and prevention of inmate to inmate message relay |
US9930042B2 (en) | 2016-03-15 | 2018-03-27 | Global Tel*Link Corporation | Controlled environment secure media streaming system |
US10225518B2 (en) * | 2016-03-23 | 2019-03-05 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US9774826B1 (en) | 2016-03-23 | 2017-09-26 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US10979670B2 (en) | 2016-03-23 | 2021-04-13 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US11528450B2 (en) | 2016-03-23 | 2022-12-13 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US9558523B1 (en) * | 2016-03-23 | 2017-01-31 | Global Tel* Link Corp. | Secure nonscheduled video visitation system |
US9615060B1 (en) | 2016-03-23 | 2017-04-04 | Global Tel*Link Corp. | Secure nonscheduled video visitation system |
US11843901B2 (en) * | 2016-03-23 | 2023-12-12 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US20230179741A1 (en) * | 2016-03-23 | 2023-06-08 | Global Tel*Link Corporation | Secure nonscheduled video visitation system |
US20180077387A1 (en) * | 2016-03-23 | 2018-03-15 | Global Tel*Link Corporation | Secure Nonscheduled Video Visitation System |
US9923936B2 (en) | 2016-04-07 | 2018-03-20 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US10715565B2 (en) * | 2016-04-07 | 2020-07-14 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US11271976B2 (en) | 2016-04-07 | 2022-03-08 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US20190253464A1 (en) * | 2016-04-07 | 2019-08-15 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US10277640B2 (en) | 2016-04-07 | 2019-04-30 | Global Tel*Link Corporation | System and method for third party monitoring of voice and video calls |
US11202120B2 (en) | 2016-05-06 | 2021-12-14 | Global Tel*Link Corporation | Controlled environment media and communication system |
US10182254B2 (en) | 2016-05-06 | 2019-01-15 | Global Tel*Link Corporation | Controlled environment media and communication system |
US11871073B2 (en) * | 2016-05-06 | 2024-01-09 | Global Tel*Link Corporation | Controlled environment media and communication system |
US9973810B2 (en) | 2016-05-06 | 2018-05-15 | Global Tel*Link Corp. | Controlled environment media and communication system |
US20220174349A1 (en) * | 2016-05-06 | 2022-06-02 | Global Tel*Link Corporation | Controlled environment media and communication system |
US9681360B1 (en) * | 2016-05-13 | 2017-06-13 | Harris Corporation | Managed access system that provides selective communications and registration of mobile wireless devices |
US10284559B2 (en) | 2016-05-13 | 2019-05-07 | Harris Corporation | Managed access system with security assessment equipment |
CN105933868A (en) * | 2016-06-27 | 2016-09-07 | 合肥指南针电子科技有限责任公司 | Prison break prevention system for supervision |
US11611721B2 (en) | 2016-10-27 | 2023-03-21 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US10405184B2 (en) | 2017-01-31 | 2019-09-03 | Harris Corporation | Mobile wireless device managed access system providing enhanced authentication features and related methods |
US10027797B1 (en) | 2017-05-10 | 2018-07-17 | Global Tel*Link Corporation | Alarm control for inmate call monitoring |
US10601982B2 (en) | 2017-05-18 | 2020-03-24 | Global Tel*Link Corporation | Third party monitoring of activity within a monitoring platform |
US11563845B2 (en) | 2017-05-18 | 2023-01-24 | Global Tel*Link Corporation | Third party monitoring of activity within a monitoring platform |
US11044361B2 (en) | 2017-05-18 | 2021-06-22 | Global Tel*Link Corporation | Third party monitoring of activity within a monitoring platform |
US10225396B2 (en) | 2017-05-18 | 2019-03-05 | Global Tel*Link Corporation | Third party monitoring of a activity within a monitoring platform |
US11526658B2 (en) | 2017-06-01 | 2022-12-13 | Global Tel*Link Corporation | System and method for analyzing and investigating communication data from a controlled environment |
US10860786B2 (en) | 2017-06-01 | 2020-12-08 | Global Tel*Link Corporation | System and method for analyzing and investigating communication data from a controlled environment |
US10896622B2 (en) | 2017-06-20 | 2021-01-19 | Global Tel*Link Corporation | Educational content delivery system for controlled environments |
US11699354B2 (en) | 2017-06-20 | 2023-07-11 | Global Tel*Link Corporation | Educational content delivery system for controlled environments |
US10693934B2 (en) | 2017-06-22 | 2020-06-23 | Global Tel*Link Corporation | Utilizing VoIP coded negotiation during a controlled environment call |
US9930088B1 (en) | 2017-06-22 | 2018-03-27 | Global Tel*Link Corporation | Utilizing VoIP codec negotiation during a controlled environment call |
US11757969B2 (en) | 2017-06-22 | 2023-09-12 | Global Tel*Link Corporation | Utilizing VoIP codec negotiation during a controlled environment call |
US11381623B2 (en) | 2017-06-22 | 2022-07-05 | Global Tel*Link Gorporation | Utilizing VoIP coded negotiation during a controlled environment call |
US10171680B1 (en) * | 2017-06-30 | 2019-01-01 | Global Tel*Link Corporation | Call processing system for modifying inmate communication limits |
US11349998B2 (en) | 2017-06-30 | 2022-05-31 | Global Tel*Link Corporation | Call processing system for modifying inmate communication limits |
US10757268B2 (en) | 2017-06-30 | 2020-08-25 | Global Tel*Link Corporation | Call processing system for modifying inmate communication limits |
US11750746B2 (en) | 2017-06-30 | 2023-09-05 | Global Tel*Link Corporation | Call processing system for modifying inmate communication limits |
US11829955B2 (en) | 2017-07-20 | 2023-11-28 | Global Tel*Link Corporation | System and method for providing job-specific training and employment to residents of a controlled environment facility |
US10699810B2 (en) * | 2017-07-20 | 2020-06-30 | Kenneth W. STEWART | Employee visit verification system |
US11164151B2 (en) | 2017-07-20 | 2021-11-02 | Global Tel*Link Corporation | System and method for providing job-specific training and employment to residents of a controlled environment facility |
US11108885B2 (en) | 2017-07-27 | 2021-08-31 | Global Tel*Link Corporation | Systems and methods for providing a visual content gallery within a controlled environment |
US10405007B2 (en) | 2017-07-27 | 2019-09-03 | Global Tel*Link Corporation | Systems and methods for a video sharing service within controlled environments |
US11595701B2 (en) | 2017-07-27 | 2023-02-28 | Global Tel*Link Corporation | Systems and methods for a video sharing service within controlled environments |
US11750723B2 (en) | 2017-07-27 | 2023-09-05 | Global Tel*Link Corporation | Systems and methods for providing a visual content gallery within a controlled environment |
US10516918B2 (en) | 2017-07-27 | 2019-12-24 | Global Tel*Link Corporation | System and method for audio visual content creation and publishing within a controlled environment |
US10122825B1 (en) | 2017-07-27 | 2018-11-06 | Global Tel*Link Corporation | Systems and methods for providing a visual content gallery within a controlled environment |
US10015546B1 (en) | 2017-07-27 | 2018-07-03 | Global Tel*Link Corp. | System and method for audio visual content creation and publishing within a controlled environment |
US11115716B2 (en) | 2017-07-27 | 2021-09-07 | Global Tel*Link Corporation | System and method for audio visual content creation and publishing within a controlled environment |
US10565247B2 (en) | 2017-07-28 | 2020-02-18 | Global Tel*Link Corporation | Controlled environment secure media streaming system with digital video recording |
US11213754B2 (en) | 2017-08-10 | 2022-01-04 | Global Tel*Link Corporation | Video game center for a controlled environment facility |
US10609089B1 (en) * | 2017-12-20 | 2020-03-31 | Securus Technologies, Inc. | Influencing the location of contraband wireless communications devices within controlled-environment facilities |
US10929940B1 (en) * | 2018-03-02 | 2021-02-23 | Securus Technologies, Llc | Controlled-environment facility message response system |
US10929941B1 (en) * | 2019-03-21 | 2021-02-23 | Securus Technologies, Llc | Controlled incarceration risk mitigation mechanisms for at risk constituents employing controlled-environment facility communications systems |
US20220272131A1 (en) * | 2020-09-04 | 2022-08-25 | Puzzle Ai Co., Ltd. | Method, electronic device and system for generating record of telemedicine service |
Also Published As
Publication number | Publication date |
---|---|
US20180260455A1 (en) | 2018-09-13 |
US10853384B2 (en) | 2020-12-01 |
US20210149911A1 (en) | 2021-05-20 |
US20140254777A1 (en) | 2014-09-11 |
US11789966B2 (en) | 2023-10-17 |
US20240054142A1 (en) | 2024-02-15 |
US8731934B2 (en) | 2014-05-20 |
US20080201143A1 (en) | 2008-08-21 |
US9552417B2 (en) | 2017-01-24 |
US20170147662A1 (en) | 2017-05-25 |
US10120919B2 (en) | 2018-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080201158A1 (en) | System and method for visitation management in a controlled-access environment | |
US10032066B2 (en) | Secure communication systems and methods | |
US11271976B2 (en) | System and method for third party monitoring of voice and video calls | |
US10003663B2 (en) | Inmate network priming | |
CA2774622C (en) | Interactive audio/video system and device for use in a secure facility | |
US20160191484A1 (en) | Secure Inmate Digital Storage | |
US10853901B2 (en) | System and method for visitation management in a controlled environment | |
US20110287748A1 (en) | Consent, Signature and Recording Retention in a Certified Communications System | |
US11956383B2 (en) | Systems and methods for blockchain wireless services in a controlled environment | |
US11363135B2 (en) | System and method for communicating with inmates in a privileged communication | |
CA2845843A1 (en) | Secure communication systems and methods |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INMATE TELEPHONE, INC., PENNSYLVANIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JOHNSON, MARK D.;ROKOSKY, JAMES P.;DOM, JOSHUA;AND OTHERS;REEL/FRAME:020738/0140 Effective date: 20080401 |
|
AS | Assignment |
Owner name: DSI-ITI, LLC,ALABAMA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ITI INMATE TELEPHONE, INC.;REEL/FRAME:024539/0775 Effective date: 20100614 Owner name: DSI-ITI, LLC, ALABAMA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ITI INMATE TELEPHONE, INC.;REEL/FRAME:024539/0775 Effective date: 20100614 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS,NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:DSI-ITI, LLC;REEL/FRAME:024626/0512 Effective date: 20100616 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS, NEW YORK Free format text: SECURITY AGREEMENT;ASSIGNOR:DSI-ITI, LLC;REEL/FRAME:024626/0512 Effective date: 20100616 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, LLC;REEL/FRAME:025990/0257 Effective date: 20101110 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: FIRST LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, LLC;REEL/FRAME:025990/0304 Effective date: 20101110 Owner name: DSI-ITI, LLC, ALABAMA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:025990/0250 Effective date: 20101110 |
|
AS | Assignment |
Owner name: GLOBAL TEL*LINK CORPORATION, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431 Effective date: 20111214 Owner name: DSI-ITI, LLC, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431 Effective date: 20111214 Owner name: VALUE-ADDED COMMUNICATIONS, INC., ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431 Effective date: 20111214 Owner name: 3V TECHNOLOGIES INCORPORATED, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:027479/0431 Effective date: 20111214 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:027489/0073 Effective date: 20111214 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: GLOBAL TEL*LINK CORPORATION, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276 Effective date: 20130523 Owner name: DSI-ITI, LLC, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276 Effective date: 20130523 Owner name: 3V TECHNOLOGIES INCORPORATED, ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276 Effective date: 20130523 Owner name: VALUE-ADDED COMMUNICATIONS, INC., ALABAMA Free format text: RELEASE OF PATENT SECURITY AGREEMENT;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:031305/0276 Effective date: 20130523 |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, NEW YORK Free format text: PATENT SECURITY AGREEMENT (SECOND LIEN);ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:031345/0243 Effective date: 20130523 Owner name: CREDIT SUISSE AG, NEW YORK Free format text: PATENT SECURITY AGREEMENT (FIRST LIEN);ASSIGNORS:DSI-ITI, LLC;GLOBAL TEL*LINK CORPORATION;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:031344/0776 Effective date: 20130523 |