Patent application number | Description | Published |
20110317685 | CONSOLIDATED VOICEMAIL PLATFORM - A voicemail system for providing voicemail services to a secure facility. An embodiment of the voicemail system includes an internet router provided at a facility for communicating with a call processing center that is located outside the facility. A database at the call processing center stores voicemail messages, a call interface receives and stores voicemail messages for residents of the facility, a resident interface provides a plurality of residents of the facility with access to the stored voicemail messages via a telephone located at the facility, and a web server provides a plurality of authorized users access to the stored voicemail messages via a website. | 12-29-2011 |
20110317820 | CENTRAL CALL PLATFORM - A system and method for providing telephone services to a secure facility from an external, centralized call platform. An embodiment of the system includes a call processing center that is external to the facility and includes a plurality of computer clusters, and is configured to route communications to and from a router located at the secure facility. Having a majority of the system located outside the facility reduces equipment requirements at each individual facility, improves security and uptime, and provides more efficient management and expansion of the call platform. | 12-29-2011 |
20120262271 | INTERACTIVE AUDIO/VIDEO SYSTEM AND DEVICE FOR USE IN A SECURE FACILITY - A system and device for providing services to a secure facility. The system includes a kiosk with a processor, display, speaker, microphone, and a camera, and the kiosk communicates with a server that includes a server processor, a network interface unit, and a computer memory. The kiosk receives communications and transmits audio and video of the communications to the server via an internet connection, and the server records the audio and video and transmits the audio and video to a destination. The kiosk is configured to authenticate the identity of a user by verifying a personal identification number entered by the user and also performing one or more of a facial recognition via the camera or a biometric voice recognition via the microphone. The kiosk provides access to services including internet services, text-based messaging, tele-medical services, religious and educational materials, commissary ordering, and entertainment. | 10-18-2012 |
20130058469 | PERSONAL ALLOWED NUMBER SYSTEM - A system and method for preventing or facilitating communications between individuals who reside in detention environments (such as e.g., prisons or correctional facilities) and individuals who are not in such detention environments using an automated authentication or verification. | 03-07-2013 |
20130263227 | SECURE COMMUNICATION SYSTEMS AND METHODS - Systems and methods for determining whether a communication session is authorized are provided. In some aspects, a method includes initiating a communication session between a first user and a second user, and obtaining an identity attribute associated with a third user engaged in the communication session. The method also includes determining whether the third user is the first user, the second user, or an unauthorized user based on the obtained identity attribute. The method also includes determining whether the communication session is authorized based on whether the third user is determined to be the first user, the second user, or the unauthorized user. | 10-03-2013 |
20130268589 | SECURE SOCIAL NETWORK - Systems and methods for facilitating and securing the exchange of digital information between individuals within the social network of a person or group of people who are subject to security or law enforcement limitations or otherwise reside within a controlled or correctional facility. All submitted information requires administrative approval, either by a human administrator or an automated process, before it can be viewed by other members of the social network. | 10-10-2013 |
20130305171 | INVESTIGATIVE SYSTEM AND METHOD FOR VISUALIZING AND NAVIGATING DYNAMIC RELATIONSHIPS - A system and method of visually representing relationships, such as transactions, communications, associations or other commonalities, between individuals in detention environments (such as prisons or detention facilities) with one or more individuals within or external to such detention environments. | 11-14-2013 |
20130328664 | SYSTEM AND METHOD FOR IDENTITY VERIFICATION IN A DETENTION ENVIRONMENT - A system and method for identity verification in a detention environment and for tracking information between individuals in a detention environment with individuals who are not in the detention environment across disparate functional systems. | 12-12-2013 |
20140266686 | TIME-BASED MULTIVARIABLE SECURE FACILITY ALARM SYSTEM - An exemplary embodiment provides for a computer-implemented method that generates a time-based multivariable secure facility alarm. The method includes selecting a person for alert monitoring, alert monitor criteria pertaining to the person and alarm notification rules. When an occurrence that satisfies the alert monitor criteria are detected, an alarm notification, based upon the alarm notification rules, is generated. The method's alert monitor criteria include at least two events and a time period such that the alert monitor criteria is satisfied when the at least two events occur within the time period. Additionally, at least one event of the at least two events is a non-telephonic event. | 09-18-2014 |
20140267540 | VIDEO COMMUNICATIONS IN DETENTION ENVIRONMENTS - Methods for providing a video communication with a detention environment are provided. In one aspect, a method includes receiving a request from a first user to initiate a video communication with a second user. The video communication uses a shared communications terminal located in a detention environment. The method further includes determining, based on a schedule of the second user, whether the second user is currently available for participating. The method also includes sending a notification to the second user to accept the request when the determination indicates the second user is currently available, and receiving a response to the notification to accept the request. The method further includes initiating the video communication when the response indicates the second user has accepted the request. Either of the users is detained in the detention environment. Systems and machine-readable media are also provided. | 09-18-2014 |
20140267547 | HANDHELD VIDEO VISITATION - An inmate mobile device for communicating with an outsider mobile device is provided. An identity data item, of the device, includes an inmate identifier of an inmate user of the inmate mobile device, a verified data and a restrictions repository. Also included is a media capture module configured to obtain an initial verification data from the inmate user of the inmate mobile device, and an outsider client application configured to receive the initial verification data from the media capture module, determine that the inmate verification data and the inmate verified data match, generate a connection request targeting the outsider mobile device. The connection request includes the inmate identifier of the inmate user and an outsider identifier of an outsider user of the outsider mobile device. The inmate application is also further configured to send the connection request to a server system. | 09-18-2014 |
20140269366 | DYNAMIC VOIP ROUTING AND ADJUSTIMENT - Systems and processes are provided for dynamically adjusting and routing signals and communications. According to one aspect, one or more codecs applied to the signals may be switched or changed to manage signal quality. According to another aspect, communications may be re-routed to an intended recipient entirely over the Internet. The systems and processes described herein are especially well suited for use in connection with detention environments. | 09-18-2014 |
20140270124 | INDIVIDUAL LOCATION TRACKING IN DETENTION ENVIRONMENTS - Methods for permitting a log in to a restricted access communications terminal are provided. In one aspect, a method includes receiving a request from a user to access a communications terminal, the request including a first authentication provided by the user, and verifying the first authentication provided by the user. The method also includes identifying the user based on the verified first authentication, determining, based on an actual location of the communications terminal, that the user is restricted from accessing the communications terminal, and requesting a second authentication from the user when the user is attempting to access the communications terminal from an unauthorized or undocumented location. The method further includes receiving the second authentication from the user, verifying the second authentication provided by the user, and providing access to the user to the communications terminal based on the verified second authentication. Systems, terminals, and machine-readable media are also provided. | 09-18-2014 |
20140270126 | CALL MANAGEMENT FOR SECURE FACILITIES - A method for controlling a call in a first controlled facility includes connecting an inmate in the first controlled facility to the call when each party of the call is verified, testing incoming audio on the call to detect a controlled facility tone from a second controlled facility, and transmitting a notification of a violation by the inmate when the controlled facility tone is detected in the incoming audio. | 09-18-2014 |
20140273929 | METHOD AND SYSTEM FOR FINANCING OF INMATE MOBILE DEVICES - A method for financing a mobile device for an inmate involves receiving a plurality of mobile device rules comprising limitations on usage of the mobile device by the inmate within a controlled facility, receiving the mobile device, and installing, on the mobile device, a mobile application, wherein the mobile application conforms the mobile device to the plurality of mobile device rules. The method also involves receiving a payment for the mobile device, and executing, by the mobile device, the mobile application. | 09-18-2014 |
20140278212 | LOCATION-BASED TRACKING SYSTEM - Geoposition data is gathered from financial transactions, digital communications, or digital files that have been exchanged between individuals, within a detention facility and individuals who are not subject to a detention environment. The geoposition data is visually represented allowing the geographical relationships between outside parties and individuals within detention facilities to be seen. A system and method of visually representing relationships, such as transactions, communications, associations or other commonalities, between individuals in detention environments (such as prisons or detention facilities) with one or more individuals within or external to such detention environments. | 09-18-2014 |
20140279767 | DETERMINING A THREAT LEVEL FOR ONE OR MORE INDIVIDUALS - A system and computer-implemented method for determining a threat level for one or more individuals includes accessing a data structure to obtain aggregated data stored therein, wherein the aggregated data comprises at least one of communication history data or transaction history data for one or more individuals. One or more predetermined metrics are applied to the obtained aggregated data, to determine threat level information for the one or more individuals. The determined threat level information is provided for display. | 09-18-2014 |
20140279789 | PREDICTING AN IDENTITY OF A PERSON BASED ON AN ACTIVITY HISTORY - Systems and methods for predicting an identity of a person are provided. In some aspects, a list of subject activities accessed by a subject person is received. For each of a plurality of stored persons, a stored list of activities accessed with by the stored person is accessed in one or more data repositories. An intersection is calculated between the list of subject activities and the stored list of activities for at least one stored person from the plurality of stored persons. That the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is predicted, based on the calculated intersection. An indication that the subject person is likely to correspond to the at least one stored person from among the plurality of stored persons is provided. | 09-18-2014 |
20140280559 | INMATE NETWORK PRIMING - A method for network priming for an inmate of a controlled facility includes receiving authentication credentials for the inmate to access a third party social network, importing social network contacts from the third party social network, filtering the social network contacts for prohibited contacts, presenting the inmate with the social network contacts, receiving, from the inmate, a selection of social network contacts to obtain selected social network contacts, and populating a secure social network list of the inmate with the selected social network contacts. | 09-18-2014 |
20140280630 | METHOD AND SYSTEM FOR EFFICIENT REVIEW OF EXCHANGED CONTENT - A method for reviewing an inmate's communications that includes receiving a two-party message including a media item, and determining whether the media item is viewable pending review. When the media item is viewable pending review, placing the media item in a conditionally viewable repository for the inmate, and making the two-party message accessible to the recipient based on the media item being placed in the conditionally viewable repository for the inmate. When the media item is not viewable pending review, placing the media item in a conditionally held repository for the inmate, and making the two-party message inaccessible to the recipient based on the media item being placed in the conditionally held repository for the inmate. The method further includes receiving review results of a review process performed on the media item, and moving the media item to a reviewed media items repository based on the review results. | 09-18-2014 |
20140280631 | MESSAGE TRANSMISSION SCHEME IN A CONTROLLED FACILITY - A method for message transmission in a controlled facility includes receiving a request to transmit a message from a superfriend in a controlled facility. The superfriend includes an administrative privilege and a removal protection. The method further includes receiving, for the message from a superfriend network list of the superfriend, a selection contacts confined in the controlled facility, sending, via an electronic network, the message to each of the contacts in the controlled facility, and presenting the message to each of the contacts in the controlled facility. For each contact, the method further includes calculating audit information capturing the presenting of the message, and transmitting an acknowledgement of receipt of the message to the superfriend | 09-18-2014 |
20140280632 | METHOD AND SYSTEM FOR SECURE SOCIAL NETWORKING ON FEATURE PHONES - A method for handing messages on a secure social network (SSN) includes receiving a message comprising a recipient name from a SSN member sender, retrieving a list of SSN member names approved to communicate with the SSN member sender, and determining that recipient name matches a first SSN member name and a second member name stored in the list of SSN member names, where the first SSN member name identifies an inmate of a controlled facility. The method further includes retrieving a first period of time since a previous communication between the SSN member sender and the first SSN member name, retrieving a second period of time since a previous communication between the SSN member sender and the second SSN member name, and sending the message to the inmate based on a comparison of the first period of time to the second period of time. | 09-18-2014 |
20140282896 | COMMUNICATIONS SYSTEM FOR RESIDENTS OF SECURE FACILITY - A system and a method are provided for two-way communications, automated request handling, and push notifications, via SMS, MMS, IM, email, and other electronic messaging systems, between (1) residents confined to a secure facility, such as a jail or a prison, and (2) persons located outside the secure facility who have friendly or family relationships with the confined residents. | 09-18-2014 |
20140282898 | METHOD AND SYSTEM FOR MEDIA CATALOGING FOR EXCHANGE IN CONTROLLED FACILITIES - In general, in one aspect, the invention relates to a method for reviewing a posting to a secure social network (SSN). The method includes receiving a first media item from a SSN member, evaluating the first media item to identify a first media attribute, and receiving a request to access the first media item from an inmate of a controlled facility. The method further includes retrieving a set of restricted attributes corresponding to the inmate, and determining whether the inmate is allowed to access the media item based on comparing the first media attribute to the set of restricted attributes. When the inmate is allowed to access the media item, granting the inmate access to the media item based on the first determination. When the inmate is not allowed to access the media item, denying the inmate access to the media item based on the first determination. | 09-18-2014 |
20140282926 | DOSSIER PACKAGING - The subject technology discloses configurations for receiving a request from a user to log into a communications server in which the request includes user credentials The user is authenticated based on the included user credentials in the request. The user is then permitted to log into the communications server if the user is successfully authenticated. An input selecting a person of interest is received. The subject technology retrieves information associated with the selected person of interest. A dossier of information including the retrieved information associated with the selected person of interest is generated. The subject technology transmits the generated dossier to the user or an indicated recipient. | 09-18-2014 |
20150039411 | Preferential Pricing, System And Method - An exemplary embodiment provides for a computer-implemented method for self-selection into a familial-based discount telephonic rate program. The method includes receiving an indication that a person is related to a current participant of the familial-based discount telephonic rate program and adding a person to the familial-based discount telephonic rate program as a relative to a current participant. The computer-implemented method further includes providing discounted telephone call rates for phone calls between the person and the current participant. | 02-05-2015 |
20150050910 | Residence-Based Calling Rates, System and Method - An exemplary embodiment provides for a computer-implemented method for rating telephone calls originating from a secure facility. The method includes receiving a destination number, of a called party, for a telephone call from the secure facility and determining, based on the destination number, if the called party is pre-verified wherein pre-verified includes at least a billing address of the called party. Next, a rate for the telephone call is then determined based on the billing address of the called party, if the called party is pre-verified. | 02-19-2015 |
20150073843 | Secure Facility Resident Grievance / Request FIling System - An exemplary embodiment provides for a computer-implemented method for processing a secure facility resident request. The method includes accepting a request type selection by the secure facility resident, providing a request form corresponding to the request type, accepting input for the request form and routing the request form to secure facility staff for review. The method additionally includes routing the request form back to the secure facility resident if further information is required and if the further information is required, accepting the further information from the secure facility resident. | 03-12-2015 |