The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.
Methods and systems for providing location fencing within a controlled environment are disclosed herein. A location fencing server determines a location of a first inmate based on a first beacon device, and determines a location of a second inmate based on a second beacon device. Further, the location fencing server determines a proximity status based on the location of the first inmate and the location of the second inmate. Additionally, the location fencing server determines that the first inmate and the second inmate are in violation of a proximity policy based on the proximity status. In some embodiments, the location fencing server sends a notification to an employee device based on the violation of a proximity policy.
H04W 4/02 - Services making use of location information
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/029 - Location-based management or tracking services
H04W 4/30 - Services specially adapted for particular environments, situations or purposes
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
3.
SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND DEVICES
The growing problem of contraband devices being smuggled into a correctional facility raises both security and safety issue. General fixed contraband detection systems are not cost effective because they require a high up-front cost and high maintenance, training and upgrade cost after installation. The present disclosure provides details of a system and method to detect and control the usage of contraband devices in a correctional facility cost effectively. Such a system is portable and can be relocated to different locations. Such as system both detects contraband devices and disrupts the operations of the contraband devices. Such a system further provides a report on the severity of contraband usage to the correctional facility.
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
A check-in and tethering system for monitoring persons such as released in court-ordered supervised programs and a method for operating such a system is disclosed. The system includes a tethered mobile device that provides a check-in procedure that requires a response from a user of the tethered mobile device in the form of at least one of a device identifier from a monitored tethered device attached to the user, a biometric response, or a performed action by the user. The tethered mobile device determines whether the response is valid and transmits a notification to a monitoring center in response to the determination.
A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.
G06F 21/10 - Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 20/12 - Payment architectures specially adapted for electronic shopping systems
The present disclosure is directed to mobile correctional facility robots and systems and methods for coordinating mobile correctional facility robots to perform various tasks in a correctional facility. The mobile correctional facility robots can be used to perform many of the tasks traditionally assigned to correctional facility guards to help reduce the number of guards needed in any given correctional facility. When cooperation is employed among multiple mobile correctional facility robots to execute tasks, a central controller can be used to coordinate the efforts of the multiple robots to improve the performance of the overall system of robots as compared to the performance of the robots when working in uncoordinated effort to execute the tasks.
F42B 12/74 - Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the material of the core or solid body
Methods and systems for providing content creation and content publishing in a controlled environment are disclosed herein. A media management device receives an audio track including lyrical content. Further, the media management device performs speech recognition analysis on the audio track to determine lyrical text corresponding to the lyrical content. Additionally, the media management device determines whether the audio track contains prohibited content based on comparing the lyrical text to a blacklist of prohibited information. When the audio track does not include prohibited content, the media management device publishes the audio track to a media library accessible to devices within the controlled environment.
H04N 9/802 - Transformation of the television signal for recording, e.g. modulation, frequency changingInverse transformation for playback involving processing of the sound signal
H04N 9/87 - Regeneration of colour television signals
H04N 21/214 - Specialised server platform, e.g. server located in an airplane, hotel or hospital
H04N 21/233 - Processing of audio elementary streams
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/6543 - Transmission by server directed to the client for forcing some client operations, e.g. recording
9.
SYSTEM FOR MONITORING OFFENDER DURING CORRECTIONAL SUPERVISORY PROGRAM
The present disclosure provides details of a system for monitoring an offender during a correctional supervisory program. The system includes an offender communication device that transmit and receive communications via a communication and monitoring center. The offender communication device include a smart phone or tablet that obtains identity information including biometric information from an offender before a communication is transmitted or received. The offender communication device also stores data including metadata, metrics, or content of a communication and transmits the stored data to the communication and monitoring center. The communication and monitoring center transmits and receives communications from the offender communication device and another communication device. Further, the communication and monitoring center provides monitoring functionality to record a communication and determine that a location of an offender is in an authorized location based on rules and requirements of the correctional supervisory program.
A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is disclosed. The variable-step authentication system may include a communication device and a server. The variable-step method includes steps for determining an authentication process that involves a number of authentication steps. The number of authentication steps is variable and dependent on a trust level associated with each participant in the communication.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system and method for securely dispensing medication are described herein. The system includes a telemedicine center that communicates with medical assistant station and a medication distribution station located at a correctional facility and a physician center remote to the correctional facility. The medical assistant station transmits a request for medication to the telemedicine center. The telemedicine center verifies an identity of the medical assistant requesting the medication and transmits the request to the physician center. When the telemedicine center receives a confirmation to dispense medicine from the physician center, an identity of the physician transmitting the confirmation is verified. The telemedicine center then verifies an identity of an inmate to receive the medication, by way of the medication distribution station, and allows the medication distribution station to dispense the medication.
G16H 20/13 - ICT specially adapted for therapies or health-improving plans, e.g. for handling prescriptions, for steering therapy or for monitoring patient compliance relating to drugs or medications, e.g. for ensuring correct administration to patients delivered from dispensers
G16H 40/67 - ICT specially adapted for the management or administration of healthcare resources or facilitiesICT specially adapted for the management or operation of medical equipment or devices for the operation of medical equipment or devices for remote operation
12.
COMMUNICATION DEVICES FOR GUARDS OF CONTROLLED ENVIRONMENTS
The present disclosure provides details of a system and method for a communication device for guards in controlled environments. The communication device is established based on an indoor wireless infrastructure in the controlled environment, receiving wireless positioning signals to calculate and determine the real-time location of a user carrying the device. The indoor wireless positioning can be combined with other available positioning methods to provide highly accurate positioning information of the guard. The communication device detects, monitors, and records activities of the guard during a period of time, and is controlled by the control center. The control center and the communication device respond quickly to different abnormal situations. In addition, the communication device detects contraband electronic devices and monitor surroundings of the guard. Thus, the disclosed system and method for the communication device provides improved communication and monitoring for guards in a controlled environment.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 21/02 - Alarms for ensuring the safety of persons
H04W 4/029 - Location-based management or tracking services
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
13.
APPARATUS FOR CONTROLLING ACCESS TO AND USE OF PORTABLE ELECTRONIC DEVICES
Various prison services are rendered more efficient by providing inmates access to portable electronic devices in a controlled and regulated manner. A dispenser is employed to control and monitor the checking out and return of portable electronic devices and to communicate with such devices during use by inmates to monitor inmate use and ensure the portable electronic devices are only used by inmates as authorized.
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A system and method for initiating a personalized virtual reality session via a virtual reality communication system in a controlled environment is disclosed. The system includes a profile subsystem configured to store an inmate profile of the inmate of the controlled environment. The system also includes a virtual reality subsystem that retrieves the inmate profile associated with the inmate from the profile subsystem, initiates the virtual reality session involving a first communication device used by the inmate of the controlled environment, and personalizes the virtual reality session based on the inmate profile. The system also includes a communication subsystem configured to transmit information related to the virtual reality session to a monitoring system.
Disclosed herein are system, method, and computer program product embodiments for locating, identifying, and tracking a known criminal, fugitive, missing person, and/or any other person of interest. An embodiment operates by deploying an unmanned aerial vehicle, determining the mode of operation of the UAV, operating the UAV in accordance with the mode of operation of the UAV, determining whether a subject has been detected, capturing a first voice sample associated with the subject, authenticating the identity of the subject, and transmitting the GPS location of the unmanned aerial vehicle to a computing device.
G01S 13/46 - Indirect determination of position data
B60R 25/25 - Means to switch the anti-theft system on or off using biometry
B64C 39/02 - Aircraft not otherwise provided for characterised by special use
B64U 20/87 - Mounting of imaging devices, e.g. mounting of gimbals
G01S 13/04 - Systems determining presence of a target
G01S 13/06 - Systems determining position data of a target
G01S 13/50 - Systems of measurement based on relative movement of target
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
G05D 1/222 - Remote-control arrangements operated by humans
G05D 1/227 - Handing over between remote control and on-board controlHanding over between remote control arrangements
G05D 1/24 - Arrangements for determining position or orientation
G05D 1/243 - Means capturing signals occurring naturally from the environment, e.g. ambient optical, acoustic, gravitational or magnetic signals
G05D 1/248 - Arrangements for determining position or orientation using signals provided by artificial sources external to the vehicle, e.g. navigation beacons generated by satellites, e.g. GPS
B64U 101/00 - UAVs specially adapted for particular uses or applications
B64U 101/30 - UAVs specially adapted for particular uses or applications for imaging, photography or videography
B64U 101/55 - UAVs specially adapted for particular uses or applications for life-saving or rescue operationsUAVs specially adapted for particular uses or applications for medical use
B64U 101/56 - UAVs specially adapted for particular uses or applications for life-saving or rescue operationsUAVs specially adapted for particular uses or applications for medical use for locating missing persons or animals
B64U 101/57 - UAVs specially adapted for particular uses or applications for life-saving or rescue operationsUAVs specially adapted for particular uses or applications for medical use for bringing emergency supplies to persons or animals in danger, e.g. ropes or life vests
B64U 101/60 - UAVs specially adapted for particular uses or applications for transporting passengersUAVs specially adapted for particular uses or applications for transporting goods other than weapons
G01C 21/16 - NavigationNavigational instruments not provided for in groups by using measurement of speed or acceleration executed aboard the object being navigatedDead reckoning by integrating acceleration or speed, i.e. inertial navigation
G01S 13/66 - Radar-tracking systemsAnalogous systems
G06V 10/62 - Extraction of image or video features relating to a temporal dimension, e.g. time-based feature extractionPattern tracking
G06V 20/58 - Recognition of moving objects or obstacles, e.g. vehicles or pedestriansRecognition of traffic objects, e.g. traffic signs, traffic lights or roads
G10L 17/00 - Speaker identification or verification techniques
A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.
H04M 1/72457 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
H04M 1/72463 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04M 3/42 - Systems providing special services or facilities to subscribers
H04M 3/436 - Arrangements for screening incoming calls
H04M 15/00 - Arrangements for metering, time-control or time-indication
A call translation system and a method for operating the management system in a controlled environment is disclosed. The call translation system includes a calling device and a call translation server. The calling device receives authorization from the call translation server to conduct call sessions within the controlled environment. The calling device further receives a call session application from the call translation server that enables the calling device to initiate and establish call sessions through the call translation server. The call session application allows a user of the calling device to select outside parties to add to the call session.
A wearable device and method for operating the wearable device in a wearable device communication system in a controlled environment is disclosed. The wearable device includes at least one module configured to customize an inmate interface on the wearable device based at least in part of an inmate profile and an administrative rule. In some embodiments, the inmate interface is a keyboard. The wearable device also includes additional modules that enable the wearable device to monitor information regarding at least one of the inmate of the wearable device and the physical environment in which the wearable device is located.
A61B 5/1171 - Identification of persons based on the shapes or appearances of their bodies or parts thereof
A61B 5/145 - Measuring characteristics of blood in vivo, e.g. gas concentration or pH-value
G06F 1/16 - Constructional details or arrangements
G06F 3/042 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by opto-electronic means
G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
G06F 3/04886 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
G06F 21/34 - User authentication involving the use of external additional devices, e.g. dongles or smart cards
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate.
A system is described herein that facilitates the easy scheduling and conducting of prison visitations. The system provides a remotely-accessible means for visitors to authenticate themselves, check the availability of those they wish to visit, and schedule a visit with that individual. As part of this process, the system tracks the availability of prison inmates as well as the devices and visit sites that are available to those inmates. In this manner, the system can quickly identify the availability of different inmates in order to provide on-demand scheduling capabilities to potential visitors. The system is connected to multiple facilities as well as public networks, and therefore can be remotely accessed. Additionally, the system also functions to monitor visits while they are in progress, as well as to store visit recordings for future review. Because the system is networked, remote monitors can access the review system in order to monitor visits or review recordings. The system also employs rigorous authentication and other security measures to ensure the safety and security of the visitors, the inmates, the staff, as well as others within the prison facility.
G06Q 10/1093 - Calendar-based scheduling for persons or groups
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
A system for detecting three-way calls in a monitored telephone conversation includes a speech recognition processor that transcribes the monitored telephone conversation and associates characteristics of the monitored telephone conversation with a transcript thereof, a database to store the transcript and the characteristics associated therewith, and a three-way Call detection processor to analyze the characteristics of the conversation and to detect therefrom the addition of one or more parties to the conversation. The system preferably includes at least one domain-specific language model that the speech recognition processor utilizes to transcribe the conversation. The system may operate in real-time or on previously recorded conversations. A query and retrieval system may be used to retrieve and review call records from the database.
H04M 3/42 - Systems providing special services or facilities to subscribers
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
H04M 11/10 - Telephonic communication systems specially adapted for combination with other electrical systems with dictation recording and playback systems
Disclosed is a voice message exchange system and method for improving communication between an inmate and a third party by enabling the inmate to leave a message when a call is not answered and further allowing the third party who receives the message to reply with a message to the inmate. Additionally, outside parties that meet the institution's requirements can leave messages for inmates at any time. The present invention can be used as an add-on to legacy inmate call management systems or incorporated internally into an inmate call management system. The system also provides monitoring, controlling, recording, and billing means.
A system for detecting inmate to inmate conference calls in a correctional facility is disclosed herein. The system includes a database and a conference call detection server, wherein the conference call detection server is configured to monitor a plurality of inmate communications, convert an audio signal of each inmate communication to a frequency domain signal, identify frequency data comprising one or more frequency peaks and corresponding frequency values in the frequency domain signal for each inmate communication, generate a record comprising the frequency data for each inmate communication, resulting in a plurality of records, store the plurality of records in the database, detect an inmate to inmate conference call by matching a frequency subset of a new inmate communication with frequency data in a detected record in the database, and verify the inmate to inmate conference call by matching audio with voice biometric samples.
H04M 3/22 - Arrangements for supervision, monitoring or testing
G10L 17/00 - Speaker identification or verification techniques
G10L 25/27 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G10L 25/78 - Detection of presence or absence of voice signals
25.
AUTHENTICATION AND CONTROL OF INCOMING COMMUNICATION
An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.
The current disclosure relates to a system and method for providing job-specific training material to an inmate within a controlled environment. In an embodiment, the system authenticates an inmate by receiving at least one authentication request at a control platform from a wireless multifunction device in response to an inmate-initiated action and provides the inmate access to interactive training materials stored on a training database or an employment subsystem configured to provide an interface for the inmate to perform one or more job-specific tasks upon authenticating the inmate. Access to each of the databases or subsystem is provided to the inmate based on a profile corresponding to the inmate and the tasks are completed using a wireless multifunction device.
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
The Controlled Environment Media And Communication System delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the Controlled Environment Media And Communication System include media distribution, video visitation, intra-facility messaging, and other such communications services.
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
Methods and systems for providing a visual content gallery within a controlled environment are disclosed herein. A content gallery server receives a content submission from an inmate device within the controlled environment. Further, the content gallery server determines that the content submission does not include prohibited content based on comparing the content submission to a blacklist of prohibited information. When the content submission does not include prohibited content, the content gallery server adds the content submission to a network accessible content gallery corresponding to an inmate associated with the inmate device. Further, authorized friends and family of the inmate may view the content submission and provide comments on the content submission.
Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
H04L 65/1059 - End-user terminal functionalities specially adapted for real-time communication
H04L 65/1069 - Session establishment or de-establishment
H04M 3/38 - Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
31.
SYSTEM AND METHOD FOR MULTI-MODAL AUDIO MINING OF TELEPHONE CONVERSATIONS
A system and method for the automated monitoring of inmate telephone calls as well as multi-modal search, retrieval and playback capabilities for said calls. A general term for such capabilities is multi-modal audio mining. The invention is designed to provide an efficient means for organizations such as correctional facilities to identify and monitor the contents of telephone conversations and to provide evidence of possible inappropriate conduct and/or criminal activity of inmates by analyzing monitored telephone conversations for events, including, but not limited to, the addition of third parties, the discussion of particular topics, and the mention of certain entities.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 16/683 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/68 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
A system and method are disclosed for preventing a restricted individual from operating a motor vehicle. The system monitors a speed of the individual via a smart device associated with the individual. The system activates a monitoring function based on a detected speed of the device, which may evidence the individual riding in a motor vehicle. The system them verifies that the user of the device is the restricted individual through a variety of different identification methods. Once identified, the system accesses various data sources associated with one or more ride applications running on the smart device in order to determine whether the restricted individual has requested a ride from a third party during a relevant time period. After analyzing the data, a determination is made as to whether the individual is driving, or whether more information is needed.
H04W 4/02 - Services making use of location information
G08G 1/052 - Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
G08G 1/017 - Detecting movement of traffic to be counted or controlled identifying vehicles
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
33.
CALL PROCESSING SYSTEM FOR MODIFYING INMATE COMMUNICATION LIMITS
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
H04K 3/00 - Jamming of communicationCounter-measures
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
35.
System and method for charging electronic devices in a controlled environment
A system, apparatus, and method are disclosed for providing electrical charge to residents of a controlled-environment facility. In an embodiment, a charging station may be provided in an area accessible to an inmate to allow charging of in an inmate smart device, such as a phone or tablet. In an embodiment, a portable charger may be provided to an inmate for charging a smart device.
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H02J 7/14 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries for charging batteries from dynamo-electric generators driven at varying speed, e.g. on vehicle
H02J 7/34 - Parallel operation in networks using both storage and other DC sources, e.g. providing buffering
H02J 7/35 - Parallel operation in networks using both storage and other DC sources, e.g. providing buffering with light sensitive cells
H02J 50/00 - Circuit arrangements or systems for wireless supply or distribution of electric power
H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
The present disclosure provides details on an intermediary service bureau (ISB) system which includes an ISB center that acts as an intermediary communication center between communication devices used by correctional facilities and contract providers. The ISB records communications, stores security data, and provides front end processing to facilitate an inmate to communicate with an outside party by way of a contract provider. Further, the ISB provides accounting services for inmates and friends and family that use services provided the contract provider. The contract provider provides security and routing services for the ISB by obtaining data from the ISB and updating data at the ISB according to the communications.
A method and system for contraband detection is provided that allows for the determining whether devices are authorized to receive power from an outlet. A power adapter and/or an outlet authenticate a device when it is connected to the outlet through the power adapter. On the basis of this authentication, a determination is made whether the devices are to receive power from the outlet. If the device is authorized, the outlet is activated, transitioning from inactive state (where no power is relayed through the outlet) to an active state (where power is relayed through the outlet).
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H01R 13/66 - Structural association with built-in electrical component
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
38.
Release monitoring through check-in and tethering system
A check-in and tethering system for monitoring persons such as released in court-ordered supervised programs and a method for operating such a system is disclosed. The system includes a tethered mobile device that provides a check-in procedure that requires a response from a user of the tethered mobile device in the form of at least one of a device identifier from a monitored tethered device attached to the user, a biometric response, or a performed action by the user. The tethered mobile device determines whether the response is valid and transmits a notification to a monitoring center in response to the determination.
Methods and systems for providing location fencing within a controlled environment are disclosed herein. A location fencing server determines a location of a first inmate based on a first beacon device, and determines a location of a second inmate based on a second beacon device. Further, the location fencing server determines a proximity status based on the location of the first inmate and the location of the second inmate. Additionally, the location fencing server determines that the first inmate and the second inmate are in violation of a proximity policy based on the proximity status. In some embodiments, the location fencing server sends a notification to an employee device based on the violation of a proximity policy.
H04W 4/02 - Services making use of location information
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 4/029 - Location-based management or tracking services
H04W 4/30 - Services specially adapted for particular environments, situations or purposes
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
40.
System and method for remote monitoring of released individual
A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.
H04B 5/77 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for interrogation
G07C 9/27 - Individual registration on entry or exit involving the use of a pass with central registration
G07C 9/28 - Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
G08B 1/00 - Systems for signalling characterised solely by the form of transmission of the signal
H04B 5/79 - Near-field transmission systems, e.g. inductive or capacitive transmission systems specially adapted for specific purposes for data transfer in combination with power transfer
H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
41.
AUGMENTED REALITY SYSTEM FOR GUARDS OF CONTROLLED ENVIRONMENT RESIDENTS
The present disclosure provides details of a system and method for a communication device for guards in a controlled environment. The communication device is established based on a wireless infrastructure in the controlled environment, receiving wireless positioning signals to calculate and determine the real-time location of personnel carrying the device. The indoor wireless positioning can be combined with other available positioning methods to provide highly accurate positioning information of the personnel. The communication device detects and records activities of the personnel during a period of time, and is controlled by the control center. The status of personnel is monitored by control center. Meanwhile, the communication device has AR functions that allow physical objects and augmented reality element to be displayed to the personnel at the same time. The personnel can thus have improved awareness of the surrounding environment and can respond to various potential dangers more effectively.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 4/02 - Services making use of location information
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
A video kiosk inmate assistance system is disclosed herein. A kiosk management server receives, from an inmate agent device, a login request to a presence based service. Further, the kiosk management server authenticates the client device based on client credentials and sets a presence status of a client to available. In addition, the kiosk management server determines client information corresponding to the client, and transmits the client information to a kiosk device located in a booking facility based on the presence status. Additionally, the kiosk management server receives a selection of the client from the kiosk device, and initializes an out of band communication channel between the client device and the kiosk device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
H04W 12/64 - Location-dependentProximity-dependent using geofenced areas
This disclosure presents a method and system to securely distribute educational content to residents of controlled-environment facilities participating in voluntary educational programs. The method and system involve the provision of portable devices to residents. The residents view externally managed educational content on the portable devices. Users outside of the controlled-environment facility configure classes and students and tailor curricula for individual residents. A portable device downloads the appropriate educational content through a synchronization process that occurs within the controlled-environment facility by interfacing with a synchronization and charging station. The portable device functions only to access the educational content and does not allow any unrelated capabilities or functionalities.
A communication system for providing a positive communication to an inmate is provided. The communication system includes memory that stores data, and an application server that that analyzes that data to determine topics that are important to the inmate. The application server includes a topic rating system to rate the topics based on importance to the inmate and based on an emotional tone used by the inmate during a communication. When the application server receives a question from the inmate, the application server searches the data and the Internet and responds based on the answer and the data stored in memory. The application server also provides support to the inmate by suggesting counseling services according to the needs of the inmate. Further, the communication system provides a positive influence to the inmate to encourage educational progression.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 16/9535 - Search customisation based on user profiles and personalisation
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
The present disclosure provides details of a system and method for customizing an inmate communication notification. Such a system provides an inmate different customized notification messages to be played to different called parties. The system includes a list of different contacts, and each of the contacts can be associated with one or more contact numbers. Each contact number is associated with one or more customized notification messages. The customized notification messages include terms, phrases, and sentences that draw the called party's attention and sound familiar to the called party. The customized notification messages include customized text files, audio files, and video files. An inmate chooses one or more customized notification messages to be played to a called party.
G06F 16/435 - Filtering based on additional data, e.g. user or group profiles
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04M 3/38 - Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
H04M 3/42 - Systems providing special services or facilities to subscribers
H04M 3/428 - Arrangements for placing incoming calls on hold
46.
Detection and prevention of inmate to inmate message relay
Secure system and method of detecting and preventing inmate to inmate message relays. A system and method which monitors inmate communications for similar phrases that occur as part of two or more separate inmate messages. These similar phrases may be overlapping in real time as in a conference call or can occur at separate times in separate messages. The communications that appear similar are assigned a score and the score is compared to a threshold. If the score is above a certain threshold, the communication is flagged and remedial actions are taken. If the flagged communication contains illegal matter then the communication can be disconnected or restricted in the future.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
A generic wireless device management system and a method for operating the management system in a controlled environment is disclosed. The enterprise management system includes a generic wireless device and a generic provisioning server. The generic wireless device, which is initially in a generic blank state, coordinates with the generic provisioning server to authenticate an inmate and to load an inmate profile. After loading the inmate profile, the generic wireless device provides access to content specific to the inmate. After the inmate signs out of the generic wireless device, the generic wireless device is returned to a generic blank state.
H04W 12/086 - Access security using security domains
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
A wireless device enterprise management system and a method for operating the management system in a controlled environment is disclosed. The enterprise management system includes implementing a container-based file system on wireless devices within the controlled environment. Enterprise management system manages and controls the organization of files into one or more containers on each wireless device. Each container is associated with one or more execution rules that allow or restrict execution of files that are located in the container.
H04L 41/28 - Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
H04L 41/50 - Network service management, e.g. ensuring proper service fulfilment according to agreements
H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
H04W 12/086 - Access security using security domains
H04L 41/12 - Discovery or management of network topologies
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
49.
Secure forum facilitator in controlled environment
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
A system for high definition (HD) image recognition of criminals is disclosed. The system includes a plurality of cameras, an image recognition server, investigator user devices, a computing device, a database, and a network. At least one processor of the image recognition server is configured to receive a plurality of photographs of a first individual, perform image processing of the plurality of photographs to extract a first set of physical features, store feature data regarding the first set of physical features in the database, receive suspect data regarding a suspected individual from a first investigator user device, match the suspect data with the feature data stored in the database, and transmit an alert to the computing device in the prison, wherein the alert activates a mobile application on each investigator user device to display match data identifying the suspected individual as the first individual based on the feature data.
G06V 10/56 - Extraction of image or video features relating to colour
G06V 10/75 - Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video featuresCoarse-fine approaches, e.g. multi-scale approachesImage or video pattern matchingProximity measures in feature spaces using context analysisSelection of dictionaries
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04N 23/90 - Arrangement of cameras or camera modules, e.g. multiple cameras in TV studios or sports stadiums
G06F 3/147 - Digital output to display device using display panels
51.
SYSTEMS AND METHODS FOR A VIDEO SHARING SERVICE WITHIN CONTROLLED ENVIRONMENTS
A system for a video sharing service for inmates in correctional facilities is disclosed. The system includes an inmate device of an inmate, a database storing inmate profiles, and a video sharing server configured to receive a registration request from the inmate device for registration of an inmate for the video sharing service, the registration request including user credentials of the inmate, retrieve an inmate profile of the inmate from the database, authenticate the inmate based on the user credentials and the inmate profile, create an account for the inmate for the video sharing service in response to authentication of the inmate, receive an upload request to upload a video from the inmate device, analyze the video for restricted content, and assign a rating to the video based on the analysis.
H04N 21/214 - Specialised server platform, e.g. server located in an airplane, hotel or hospital
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/235 - Processing of additional data, e.g. scrambling of additional data or processing content descriptors
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/2743 - Video hosting of uploaded data from client
H04N 21/437 - Interfacing the upstream path of the transmission network, e.g. for transmitting client requests to a VOD server
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/475 - End-user interface for inputting end-user data, e.g. PIN [Personal Identification Number] or preference data
H04N 21/482 - End-user interface for program selection
H04N 21/8405 - Generation or processing of descriptive data, e.g. content descriptors represented by keywords
52.
SYSTEM AND METHOD FOR DETECTING AND CONTROLLING CONTRABAND DEVICES IN A CORRECTIONAL FACILITY UTILIZING PORTABLE ELECTRONIC DEVICES
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices and drones/UAVs by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
41 - Education, entertainment, sporting and cultural services
Goods & Services
Education services, namely, providing classes, seminars and workshops for incarcerated and formerly incarcerated individuals in the fields of obtaining job skills, language arts, science and math, and mental health coping skills
54.
System and method for assessing security threats and criminal proclivities
A centralized and robust threat assessment tool is disclosed to perform comprehensive analysis of previously-stored and subsequent communication data, activity data, and other relevant information relating to inmates within a controlled environment facility. As part of the analysis, the system detects certain keywords and key interactions with the dataset in order to identify particular criminal proclivities of the inmate. Based on the identified proclivities, the system assigns threat scores to inmate that represents a relative likelihood that the inmate will carry out or be drawn to certain threats and/or criminal activities. This analysis provides a predictive tool for assessing an inmate's ability to rehabilitate. Based on the analysis, remedial measures can be taken in order to correct an inmate's trajectory within the controlled environment and increase the likelihood of successful rehabilitation, as well as to prevent potential criminal acts.
The present disclosure describes a monitoring environment that monitors an activity for activity that may be indicative of being prohibited by the local, the state, and/or the national governing authorities, namely suspicious activity, or activity that is prohibited by the local, the state, and/or the national governing authorities, namely prohibited activity. The monitoring environment verifies the activity is actually being monitored within the monitoring environment. The verification can require one or more monitoring persons monitoring the activity to perform one or more tasks to verify their attentiveness in monitoring the activity. The one or more tasks can be as simple as activating a checkbox or providing a code or an electronic signature to provide some examples, although more complicated tasks, such as a biometric verification such as a retinal, a facial, and/or a voice verification to provide some examples, are possible as will be recognized by those skilled in the relevant art(s) without departing from the spirit and scope of the present disclosure.
A method and system are described for enhancing the security of calls made by a member of a controlled environment to an outside party, particularly when the outside party communicates via a cellular phone. An application is provided for the cellular device, which must communicate and register with a calling platform of the controlled environment. Certain elements of personal verification data are obtained by the user of the cellular device and stored at the calling platform for later reference. Calls from the inmate to the cellular device cause the calling platform to issue a notification to the user via the application. The user verifies his/her identity using the application, after which the call can be connected. As a further security measure, certain conditions can be required and periodically checked during the call to ensure the user remains verified.
H04M 15/00 - Arrangements for metering, time-control or time-indication
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04M 1/72406 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
The present disclosure is directed to mobile correctional facility robots and systems and methods for coordinating mobile correctional facility robots to perform various tasks in a correctional facility. The mobile correctional facility robots can be used to perform many of the tasks traditionally assigned to correctional facility guards to help reduce the number of guards needed in any given correctional facility. When cooperation is employed among multiple mobile correctional facility robots to execute tasks, a central controller can be used to coordinate the efforts of the multiple robots to improve the performance of the overall system of robots as compared to the performance of the robots when working in uncoordinated effort to execute the tasks.
F42B 12/74 - Projectiles, missiles or mines characterised by the warhead, the intended effect, or the material characterised by the material of the core or solid body
G05D 1/00 - Control of position, course, altitude or attitude of land, water, air or space vehicles, e.g. using automatic pilots
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
The growing amount of communication data generated by inmates in controlled environments makes a timely and effective investigation and analysis more and more difficult. The present disclosure provides details of a system and method to investigate and analyze the communication data in a correctional facility timely and effectively. Such a system receives both real time communication data and recorded communication data, processes and investigates the data automatically, and stores the received communication data and processed communication data in a unified data server. Such a system enables a reviewer to review, modify and insert markers and comments for the communication data. Such a system further enables the reviewer to search the communication data and create scheduled search reports.
A dual-mode mobile device and a method for coordinating calls for the dual-mode mobile device over a first and second connection within a controlled environment is disclosed. The method includes communications between a monitoring server and the dual-mode mobile device over the first connection while the dual-mode mobile device conducts the call over the second connection. The monitoring server transmits control messages to the dual-mode mobile device to control operations of the dual-mode mobile device and establishment of the call and also monitors operations of the dual-mode mobile device as well as the communications transmitted and received by the dual-mode mobile device during the call.
H04W 12/086 - Access security using security domains
H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
A messaging system for relaying messages to groups of inmates located in one or more controlled-environment facilities. The system receives a message from a user and a recipient designation identifying those inmates designated for receiving the message. The system performs a content check of the message or requests administrator authorization of the message, and then packages the message in a format designated by the facility. The packaged message includes the message itself, and also recipient information and other delivery information. The message may be packaged uniquely according to facility specifications. At the facility, the received message is unpacked. Recipients are identified from the recipient designation in the message, and delivery methods are retrieved for each of the intended recipients. Delivery of the message is then carried out, at a time designated in the message, according to the retrieved delivery methods.
H04L 51/066 - Format adaptation, e.g. format conversion or compression
H04L 51/214 - Monitoring or handling of messages using selective forwarding
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
62.
CENTRALIZED OFFENDER MANAGEMENT SYSTEM FOR MULTIPLE JURISDICTIONS
An offender management system (OMS) is a system designed to help process information related to inmates of a correctional facility. Information about an inmate's behavioral history, history in the legal system, and the inmate's financial account are all tracked in an OMS. OMS have been housed on the correctional facility premises, and are proprietary based on the needs of the correctional facility. The current disclosure is directed to an OMS that is housed remotely in data centers and has comprehensive functionality and customizability based on simple guided user interfaces (GUIs). This allows correctional facility administrators to easily customize the OMS to suit the needs of their facilities while removing the overhead required to maintain such systems. The customizability also allows the OMS to serve multiple jurisdictions at once. The centralized OMS contains many novel abilities such as workflow creation, real-time status monitoring of prison processes and accounting processing functions.
Systems and methods for providing secure communication between an inmate and an outside user are disclosed. In various aspects, account information of both the user and the inmate is stored. A message transmission is received from a first device that includes a header portion and an encrypted payload portion. The system verifies that confidential communication between the inmate and the outside user is permitted based on the header portion and the stored account information. Once verified, the message is transmitted to a second device without decrypting the payload portion of the message.
There is a growing problem in correctional facilities in which contraband devices may be smuggled into a correctional facility. These devices are not subject to the typical monitoring and control provided by the inmate communication system provided by the correctional facility, and thus pose a significant security risk. The present disclosure provides details of a system and method that leverages the sanctioned mobile devices and the wireless infrastructure of the inmate communication system to scan for and triangulate the location of contraband devices. The mobile and wireless infrastructure devices scan for transmissions indicative of a contraband device and send alerts to each other and to a central monitoring system. The central monitoring system then leverages multiple alerts to determine a location of the contraband device using multiple triangulation techniques. The triangulation may also be performed by the mobile devices themselves.
Disclosed herein are system, method, and computer program product embodiments for providing presence-based secure communications in a controlled environment. In an embodiment, a presence management system monitors communication status information related to communication devices within a controlled facility as well as communication devices external to the controlled facility. Communication statuses indicate the availability of users to receive certain types of communications, such as, for example, video conferencing, audio calls, and/or textual messages. In embodiments, secure communications are provided between inmates and approved individuals, such as medical or legal professionals, based on the communication statuses. Such secure communications are encrypted and not monitored for content.
A system is described herein that facilitates the easy scheduling and conducting of prison visitations. The system provides a remotely-accessible means for visitors to authenticate themselves, check the availability of those they wish to visit, and schedule a visit with that individual. As part of this process, the system tracks the availability of prison inmates as well as the devices and visit sites that are available to those inmates. In this manner, the system can quickly identify the availability of different inmates in order to provide on-demand scheduling capabilities to potential visitors. The system is connected to multiple facilities as well as public networks, and therefore can be remotely accessed. Additionally, the system also functions to monitor visits while they are in progress, as well as to store visit recordings for future review. Because the system is networked, remote monitors can access the review system in order to monitor visits or review recordings. The system also employs rigorous authentication and other security measures to ensure the safety and security of the visitors, the inmates, the staff, as well as others within the prison facility.
G07C 9/25 - Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
G06Q 10/1093 - Calendar-based scheduling for persons or groups
67.
Apparatus for controlling access to and use of portable electronic devices
Various prison services are rendered more efficient by providing inmates access to portable electronic devices in a controlled and regulated manner. A dispenser is employed to control and monitor the checking out and return of portable electronic devices and to communicate with such devices during use by inmates to monitor inmate use and ensure the portable electronic devices are only used by inmates as authorized.
G06Q 20/14 - Payment architectures specially adapted for billing systems
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
Disclosed herein is a system that includes an order processing subsystem and a delivery processing subsystem comprising at least one database and one or more processors. The one or more processors of the delivery processing subsystem is configured to receive a request for a user to access the delivery processing subsystem and a scanning device, authenticate the user by verifying the request with user credentials stored in the at least one database, provide the user with access to the delivery processing subsystem and the scanning device, receive scanned data from the scanning device, retrieve package data regarding a package for an inmate based on the scanned data from the scanning device, and generate, based on the package data, a route in the correctional facility for delivery of the package to the inmate in the correctional facility, wherein the route does not include an identity of the inmate.
A system and method for initiating a personalized virtual reality session via a virtual reality communication system in a controlled environment is disclosed. The system includes a profile subsystem configured to store an inmate profile of the inmate of the controlled environment. The system also includes a virtual reality subsystem that retrieves the inmate profile associated with the inmate from the profile subsystem, initiates the virtual reality session involving a first communication device used by the inmate of the controlled environment, and personalizes the virtual reality session based on the inmate profile. The system also includes a communication subsystem configured to transmit information related to the virtual reality session to a monitoring system.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
Video conferencing in a controlled environment facility entails significant security concerns. These concerns are even more prevalent in a system that permits residents of such facilities to communicate via their own personal devices. Therefore, in order to alleviate these concerns and provide a secure system in which a resident is able to make video calls using their personal device, a kiosk unit is provided to which the personal device must be linked for completing a video call. When making the video call, the camera and display on the personal device are disabled, and all video data is captured and displayed by the kiosk unit. The link between the kiosk unit and the personal device facilitates the exchange of the image information for transmission to the outside party, or display to the user. By providing a fixed camera, and disabling the personal device camera, security can be maintained while permitting video calling services.
H04M 3/38 - Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
H04L 65/1069 - Session establishment or de-establishment
H04L 65/1059 - End-user terminal functionalities specially adapted for real-time communication
G07C 9/37 - Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
71.
Variable-step authentication for communications in controlled environment
A variable-step authentication system and a method for operating for performing variable-step authentication for communications in a controlled environment is disclosed. The variable-step authentication system may include a communication device and a server. The variable-step method includes steps for determining an authentication process that involves a number of authentication steps. The number of authentication steps is variable and dependent on a trust level associated with each participant in the communication.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
73.
System and method for detecting and controlling contraband devices
The growing problem of contraband devices being smuggled into a correctional facility raises both security and safety issue. General fixed contraband detection systems are not cost effective because they require a high up-front cost and high maintenance, training and upgrade cost after installation. The present disclosure provides details of a system and method to detect and control the usage of contraband devices in a correctional facility cost effectively. Such a system is portable and can be relocated to different locations. Such as system both detects contraband devices and disrupts the operations of the contraband devices. Such a system further provides a report on the severity of contraband usage to the correctional facility.
The present disclosure provides details of a system and method for a communication device for guards in a controlled environment. The communication device is established based on a wireless infrastructure in the controlled environment, receiving wireless positioning signals to calculate and determine the real-time location of personnel carrying the device. The indoor wireless positioning can be combined with other available positioning methods to provide highly accurate positioning information of the personnel. The communication device detects and records activities of the personnel during a period of time, and is controlled by the control center. The status of personnel is monitored by control center. Meanwhile, the communication device has AR functions that allow physical objects and augmented reality element to be displayed to the personnel at the same time. The personnel can thus have improved awareness of the surrounding environment and can respond to various potential dangers more effectively.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
G08B 21/04 - Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
G08B 5/22 - Visible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electric transmissionVisible signalling systems, e.g. personal calling systems, remote indication of seats occupied using electromagnetic transmission
G08B 25/00 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
H04W 4/02 - Services making use of location information
G08B 23/00 - Alarms responsive to unspecified undesired or abnormal conditions
G06V 20/20 - ScenesScene-specific elements in augmented reality scenes
G06V 20/52 - Surveillance or monitoring of activities, e.g. for recognising suspicious objects
G06Q 10/0631 - Resource planning, allocation, distributing or scheduling for enterprises or organisations
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
G06T 11/60 - Editing figures and textCombining figures or text
75.
CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
A Controlled Environment Secure Media Streaming System with Digital Video Recording (DVR) manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. When requested content is not available, the system schedule a future retrieval or DVR of the content when it becomes available. When the system detects that the content is stopped, the system creates a bookmark, so the user can resume the content at the bookmarked portion at a later time.
Disclosed herein is a system that includes an order processing subsystem and a delivery processing subsystem comprising at least one database and one or more processors. The one or more processors of the delivery processing subsystem is configured to receive a request for a user to access the delivery processing subsystem and a scanning device, authenticate the user by verifying the request with user credentials stored in the at least one database, provide the user with access to the delivery processing subsystem and the scanning device, receive scanned data from the scanning device, retrieve package data regarding a package for an inmate based on the scanned data from the scanning device, and generate, based on the package data, a route in the correctional facility for delivery of the package to the inmate in the correctional facility, wherein the route does not include an identity of the inmate.
G06Q 10/087 - Inventory or stock management, e.g. order filling, procurement or balancing against orders
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
A system and method are disclosed for activating remote monitoring functionality of a personal wireless device associated with a released individual. After incarceration, former inmates are released under a variety of different circumstances, many of which require follow-up check-ins with case managers or other individuals. As part of their release, inmates often agree to multiple restrictions and requirements. In order to better monitor compliance with those requirements, a personal wireless device assigned to the released individual can be programmed with certain rules and automatically trigger when a violation is detected. As a result of a detected violation, the personal wireless device activates certain devices, such as a camera, microphone, etc., to capture data in order to remotely monitor the released individual. A case manager can also manually activate monitoring.
A communication system for providing a positive communication to an inmate is provided. The communication system includes memory that stores data, and an application server that that analyzes that data to determine topics that are important to the inmate. The application server includes a topic rating system to rate the topics based on importance to the inmate and based on an emotional tone used by the inmate during a communication. When the application server receives a question from the inmate, the application server searches the data and the Internet and responds based on the answer and the data stored in memory. The application server also provides support to the inmate by suggesting counseling services according to the needs of the inmate. Further, the communication system provides a positive influence to the inmate to encourage educational progression.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
G06F 16/9535 - Search customisation based on user profiles and personalisation
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
79.
Utilizing VoIP codec negotiation during a controlled environment call
Controlled-environment communication systems are increasingly using voice over internet protocol (VoIP) to serve their users. VoIP allows voice to be sent in packetized form, where audio is encoded using one of several codecs. Because of bandwidth constraints, particularly during peak call times, codecs may be used which sacrifice audio quality for bandwidth efficiency. As a result, several features of communication systems, including critical security features. The present disclosure provides details for systems and methods by which a controlled-environment communication system may shift between codecs to perform security-related features or to alleviate bandwidth considerations. This involves the special formatting of control-signaling messages, including session initiation protocol (SIP) and session description protocol (SDP) messaging.
H04L 65/1069 - Session establishment or de-establishment
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
H04M 7/00 - Arrangements for interconnection between switching centres
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
H04L 65/1045 - Proxies, e.g. for session initiation protocol [SIP]
An incoming communication processing system and method is disclosed for providing communication and data services to residents of a controlled facility. Specifically, the incoming communication processing system allows outside parties to initiate communications to residents of a controlled facility. The incoming communication processing system may work in conjunction with or separately from an outgoing communication processing system. Many restrictions and safeguards may be implemented within the incoming communication system in order to prevent improper use.
A system for customizing time limits for inmate communications in a correctional facility is disclosed. The system includes a profile subsystem that stores an inmate profile of the inmate and a communication processing subsystem comprising one or more processors configured to receive data of an inmate communication of an inmate, identify a type of communication device of the inmate and a call recipient of the inmate communication based on the data of the inmate communication, retrieve the inmate profile of the inmate form the profile subsystem, identify a plurality of behaviors of the inmate based on the inmate profile, determine a time limit based on at least one of the type of communication device, the call recipient of the inmate communication, and the plurality of behaviors of the inmate, and assign the time limit to the inmate communication of the inmate.
A method and system for contraband detection is provided that allows for the determining whether devices are authorized to receive power from an outlet. A power adapter and/or an outlet authenticate a device when it is connected to the outlet through the power adapter. On the basis of this authentication, a determination is made whether the devices are to receive power from the outlet. If the device is authorized, the outlet is activated, transitioning from inactive state (where no power is relayed through the outlet) to an active state (where power is relayed through the outlet).
H02J 13/00 - Circuit arrangements for providing remote indication of network conditions, e.g. an instantaneous record of the open or closed condition of each circuitbreaker in the networkCircuit arrangements for providing remote control of switching means in a power distribution network, e.g. switching in and out of current consumers by using a pulse code signal carried by the network
H01R 13/66 - Structural association with built-in electrical component
H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H01R 13/70 - Structural association with built-in electrical component with built-in switch
H01R 25/00 - Coupling parts adapted for simultaneous co-operation with two or more identical counterparts, e.g. for distributing energy to two or more circuits
H01R 31/06 - Intermediate parts for linking two coupling parts, e.g. adapter
83.
System and method for monitoring a former convict of an intoxication-related offense
A system and method are disclosed for preventing a restricted individual from operating a motor vehicle. The system monitors a speed of the individual via a smart device associated with the individual. The system activates a monitoring function based on a detected speed of the device, which may evidence the individual riding in a motor vehicle. The system them verifies that the user of the device is the restricted individual through a variety of different identification methods. Once identified, the system accesses various data sources associated with one or more ride applications running on the smart device in order to determine whether the restricted individual has requested a ride from a third party during a relevant time period. After analyzing the data, a determination is made as to whether the individual is driving, or whether more information is needed.
B60Q 1/50 - Arrangement of optical signalling or lighting devices, the mounting or supporting thereof or circuits therefor the devices being primarily intended to indicate the vehicle, or parts thereof, or to give signals, to other traffic for indicating other intentions or conditions, e.g. request for waiting or overtaking
H04W 4/02 - Services making use of location information
G08G 1/052 - Detecting movement of traffic to be counted or controlled with provision for determining speed or overspeed
G08G 1/017 - Detecting movement of traffic to be counted or controlled identifying vehicles
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
H04W 4/40 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
H04L 67/53 - Network services using third party service providers
84.
System and method for third party monitoring of voice and video calls
A system is described herein that facilitates the monitoring of inmate communications. The system provides a remotely-accessible means for a reviewer to monitor a call between an inmate and another person. The system includes a monitoring server and a monitoring station. The monitoring server is configured to receive a call and call information from a communication center and process the call for monitoring, schedule a review of the call; and store the call, the call information, and scheduling data. The monitoring station is configured to receive the call and the call information from the monitoring server based on the scheduling data, and to display the identifying information and facilitate the review of the call.
Disclosed herein are system, method, and computer program product embodiments for identifying and monitoring social media accounts belonging to offenders, inmates, and relevant third parties. In an embodiment, a social media monitoring system retrieves information from a criminal history database to identify and verify social media account information. In an embodiment, a social media monitoring system retrieves information from an offender communication device, such as a computer, phone, or tablet, to identify and verify social media account information. The social media monitoring system analyzes this information, retrieves social media accounts, and generates a confidence score and/or relevance score for each retrieved social media account. Social media monitoring system organizes links to the social media accounts based on the scores and also generates alerts when a security threat associated with the social media accounts is detected.
The present subject matter is directed to an apparatus and methodology for monitoring for the occurrence of use of unauthorized telecommunications equipment within a designated area. The present subject matter has particular utility to the corrections environment in that it discloses a methodology for detecting and reporting the unauthorized operation of cellular telephones within a corrections facility. The present technology may be used advantageously in combination with inmate telephone systems to transmit information to appropriate personnel in the form of email messages and/or voice communications by way of telephone local or corrections facility external telephone lines. The present technology also provides for recordation and storage of time, date and location information for detected events.
H04K 3/00 - Jamming of communicationCounter-measures
H04W 48/02 - Access restriction performed under specific conditions
H04M 11/04 - Telephonic communication systems specially adapted for combination with other electrical systems with alarm systems, e.g. fire, police or burglar alarm systems
H04W 64/00 - Locating users or terminals for network management purposes, e.g. mobility management
H04M 3/22 - Arrangements for supervision, monitoring or testing
H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
H04W 48/04 - Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction or speed
A system for detecting inmate to inmate conference calls in a correctional facility is disclosed herein. The system includes a database and a conference call detection server, wherein the conference call detection server is configured to monitor a plurality of inmate communications, convert an audio signal of each inmate communication to a frequency domain signal, identify frequency data comprising one or more frequency peaks and corresponding frequency values in the frequency domain signal for each inmate communication, generate a record comprising the frequency data for each inmate communication, resulting in a plurality of records, store the plurality of records in the database, detect an inmate to inmate conference call by matching a frequency subset of a new inmate communication with frequency data in a detected record in the database, and verify the inmate to inmate conference call by matching audio with voice biometric samples.
H04M 3/22 - Arrangements for supervision, monitoring or testing
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G10L 25/27 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique
G10L 25/78 - Detection of presence or absence of voice signals
G10L 17/00 - Speaker identification or verification techniques
H04M 3/56 - Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
88.
Detection and prevention of inmate to inmate message relay
Secure system and method of detecting and preventing inmate to inmate message relays. A system and method which monitors inmate communications for similar phrases that occur as part of two or more separate inmate messages. These similar phrases may be overlapping in real time as in a conference call or can occur at separate times in separate messages. The communications that appear similar are assigned a score and the score is compared to a threshold. If the score is above a certain threshold, the communication is flagged and remedial actions are taken. If the flagged communication contains illegal matter then the communication can be disconnected or restricted in the future.
G10L 25/51 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination
G06F 16/25 - Integrating or interfacing systems involving database management systems
A layered security suite is disclosed wherein multiple security barriers that prevent the unsanctioned use of a mobile device issued by a controlled-environment facility. The security barriers are implemented along multiple points within the communication path between the mobile device with outside networks, including on the mobile device, on wireless access points that serve data traffic for the mobile device, and a firewall device that monitors all data coming to and from the wireless access points. The barriers on the mobile device prevent the user from performing unsanctioned application and settings changes, including both software and hardware components, while the barrier on the wireless access point detects and prevents unauthorized connections between mobile devices and unsanctioned wireless access points. The firewall device discards packets with unsanctioned internet addresses. The layers work in concert to prevent all manner of tampering with the mobile device by members of the controlled-environment facility.
H04M 1/18 - Telephone sets specially adapted for use in ships, mines, or other places exposed to adverse environment
H04M 1/72412 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
H04W 12/082 - Access security using revocation of authorisation
H04W 12/084 - Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
H04W 12/088 - Access security using filters or firewalls
H04M 1/67 - Preventing unauthorised calls from a telephone set by electronic means
H04M 1/72409 - User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 12/126 - Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
H04W 12/30 - Security of mobile devicesSecurity of mobile applications
H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
90.
Video game center for a controlled environment facility
In the present disclosure, systems and methods are described for video gaming in a controlled environment facility. A video game server allows tenants of a controlled environment facility to play video games that are served and monitored by the video game server. In embodiments, users may initiate a game session to play games in a single player mode, competitive multiplayer or cooperative multiplayer mode depending on the game being played. The video game server maintains block lists for each user such that those users may not initiate or engage in the same game sessions with each other. In game sessions with two or more users, the video game server allows users to communicate via audio or text communications. The video game server may monitor those communications for potential security concerns. Users may also view videos of previously completed or live game sessions, subject to similar security monitoring measures.
A63F 13/73 - Authorising game programs or game devices, e.g. checking authenticity
A63F 13/32 - Interconnection arrangements between game servers and game devicesInterconnection arrangements between game devicesInterconnection arrangements between game servers using local area network [LAN] connections
A63F 13/335 - Interconnection arrangements between game servers and game devicesInterconnection arrangements between game devicesInterconnection arrangements between game servers using wide area network [WAN] connections using Internet
The present disclosure provides details of a system and method for a communication device for guards in controlled environments. The communication device is established based on an indoor wireless infrastructure in the controlled environment, receiving wireless positioning signals to calculate and determine the real-time location of a user carrying the device. The indoor wireless positioning can be combined with other available positioning methods to provide highly accurate positioning information of the guard. The communication device detects, monitors, and records activities of the guard during a period of time, and is controlled by the control center. The control center and the communication device respond quickly to different abnormal situations. In addition, the communication device detects contraband electronic devices and monitor surroundings of the guard. Thus, the disclosed system and method for the communication device provides improved communication and monitoring for guards in a controlled environment.
G08B 25/10 - Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
H04W 4/029 - Location-based management or tracking services
H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
H04W 4/90 - Services for handling of emergency or hazardous situations, e.g. earthquake and tsunami warning systems [ETWS]
G08B 21/02 - Alarms for ensuring the safety of persons
92.
Controlled environment media and communication system
The Controlled Environment Media And Communication System delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the Controlled Environment Media And Communication System include media distribution, video visitation, intra-facility messaging, and other such communications services.
H04N 21/442 - Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed or the storage space available from the internal hard disk
H04N 21/6543 - Transmission by server directed to the client for forcing some client operations, e.g. recording
H04L 65/1059 - End-user terminal functionalities specially adapted for real-time communication
H04L 65/611 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for multicast or broadcast
H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
H04L 65/1069 - Session establishment or de-establishment
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
93.
System and method for detecting and controlling contraband devices in a controlled environment
The present disclosure provides details of a system and method for detecting and monitoring a contraband device including communication devices by utilizing a combination of mobile devices, fixed monitoring devices, and a contraband monitoring center. The mobile devices include smart phones or tablets that are borrowed, rented, or purchased by an inmate from a correctional facility. These mobile devices are configured to detect, monitor, and intervene in the communications of target devices. Further, the mobile devices are configured to communicate with fixed monitoring devices located throughout the correctional facility in performing intervention operations. The contraband monitoring center may also be utilized in the coordination, monitoring, and intervention of target devices.
H04M 3/20 - Automatic or semi-automatic exchanges with means for interrupting existing connectionsAutomatic or semi-automatic exchanges with means for breaking-in on conversations
H04W 4/02 - Services making use of location information
H04M 3/22 - Arrangements for supervision, monitoring or testing
A communication device and system are disclosed for providing communication and data services to residents of a controlled facility. The device can be restricted to communicating only using an internet protocol so as to restrict the device communication to an internal intranet. Wireless access points may be disposed throughout the environment to route calls and data between the device and a central processing center. By converting a protocol of the communications received from the device to a protocol used by the central processing center, minimal modifications to the central processing center are needed to support a wireless communication infrastructure. Many restrictions and safeguards may be implemented within the phone and system in order to prevent improper use.
H04M 1/72457 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
H04M 1/72463 - User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
The current disclosure relates to a system and method for providing job-specific training material to an inmate within a controlled environment. In an embodiment, the system authenticates an inmate by receiving at least one authentication request at a control platform from a wireless multifunction device in response to an inmate-initiated action and provides the inmate access to interactive training materials stored on a training database or an employment subsystem configured to provide an interface for the inmate to perform one or more job-specific tasks upon authenticating the inmate. Access to each of the databases or subsystem is provided to the inmate based on a profile corresponding to the inmate and the tasks are completed using a wireless multifunction device.
An forum facilitator device is provided that allows for a controlled environment to provide a secure forum for residents to provide communications to other registered users of the secure forum. The communications are provided through posts made in the secure forum and through other types of communications from the inmate such as but not limited to emails and text messages. The forum facilitator device operates the secure forum and implements rules to control what is posted on the secure forum, who is able to access the secure forum, and what entities are allowed to view and interact with residents of the controlled environment.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 67/1042 - Peer-to-peer [P2P] networks using topology management mechanisms
H04L 51/00 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
Methods and systems for providing a visual content gallery within a controlled environment are disclosed herein. A content gallery server receives a content submission from an inmate device within the controlled environment. Further, the content gallery server determines that the content submission does not include prohibited content based on comparing the content submission to a blacklist of prohibited information. When the content submission does not include prohibited content, the content gallery server adds the content submission to a network accessible content gallery corresponding to an inmate associated with the inmate device. Further, authorized friends and family of the inmate may view the content submission and provide comments on the content submission.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 67/63 - Routing a service request depending on the request content or context
Methods and systems for providing content creation and content publishing in a controlled environment are disclosed herein. A media management device receives an audio track including lyrical content. Further, the media management device performs speech recognition analysis on the audio track to determine lyrical text corresponding to the lyrical content. Additionally, the media management device determines whether the audio track contains prohibited content based on comparing the lyrical text to a blacklist of prohibited information. When the audio track does not include prohibited content, the media management device publishes the audio track to a media library accessible to devices within the controlled environment.
H04N 9/802 - Transformation of the television signal for recording, e.g. modulation, frequency changingInverse transformation for playback involving processing of the sound signal
H04N 9/87 - Regeneration of colour television signals
H04N 21/214 - Specialised server platform, e.g. server located in an airplane, hotel or hospital
H04N 21/233 - Processing of audio elementary streams
H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
H04N 21/254 - Management at additional data server, e.g. shopping server or rights management server
H04N 21/45 - Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies or resolving scheduling conflicts
H04N 21/472 - End-user interface for requesting content, additional data or servicesEnd-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification or for manipulating displayed content
H04N 21/6543 - Transmission by server directed to the client for forcing some client operations, e.g. recording
A communication system for providing a positive communication to an inmate is provided. The communication system includes memory that stores data, and an application server that analyzes data to determine topics that are important to the inmate. The application server includes a topic rating system to rate the topics based on importance to the inmate and based on an emotional tone used by the inmate during a communication. When the application server receives a question from the inmate, the application server searches the data and the Internet and responds based on the answer and the data stored in memory. The application server also provides support to the inmate by suggesting counseling services according to the needs of the inmate. Further, the communication system provides a positive influence to the inmate to encourage educational progression.
H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
G06F 16/9535 - Search customisation based on user profiles and personalisation
H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
The present disclosure provides details of a system for monitoring an offender during a correctional supervisory program. The system includes an offender communication device that transmit and receive communications via a communication and monitoring center. The offender communication device include a smart phone or tablet that obtains identity information including biometric information from an offender before a communication is transmitted or received. The offender communication device also stores data including metadata, metrics, or content of a communication and transmits the stored data to the communication and monitoring center. The communication and monitoring center transmits and receives communications from the offender communication device and another communication device. Further, the communication and monitoring center provides monitoring functionality to record a communication and determine that a location of an offender is in an authorized location based on rules and requirements of the correctional supervisory program.