This disclosure relates to a communication system capable of detecting unauthorized employee communications that are either made from within a controlled environment facility, or that involve an inmate of the controlled environment facility.
Controlled environment facilities, such as prisons, place numerous restrictions on communications afforded to residents of such facilities. These restrictions come in many forms, such as a limit on an amount of phone calls permitted, restricting whom the resident is permitted to contact, monitoring calls for certain keywords and phrases to prevent planning of illegal activities, etc. Although most of these security measures target the resident specifically, some restrictions and monitoring efforts also examine the activities of the called party.
The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate embodiments of the present disclosure and, together with the description, further serve to explain the principles of the disclosure and to enable a person skilled in the pertinent art to make and use the embodiments.
The present disclosure will be described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the disclosure. Rather, the scope of the disclosure is defined only in accordance with the following claims and their equivalents.
Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
For purposes of this discussion, any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the disclosure that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or customize for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
This disclosure pertains to security measures taken with respect to communications involving parties residing within, or communicating within a controlled environment facility. Such controlled-environment facilities may include prisons, hospitals, jails, nursing homes, schools, office buildings, government agencies, etc., or any other facility or environment where communications may wish to be controlled, restricted, or monitored. This disclosure will be described in the context of a prison facility.
In such controlled-environment facilities, there is typically a desire to restrict access to a communication system, control the amount, types, and manners of outgoing and incoming communications, and often monitor such communications. There are many reasons why such restrictions are desired, but primarily are implemented for security and financial concerns. Namely, in controlled environments, residents often have access to a variety of different communication devices. Without being able to positively identify the caller, revenues often are lost due to an inability to collect. Additionally, particularly in prisons and other types of correctional facilities, access must be carefully controlled to prevent communications with prohibited parties, such as judges, jury members, victims, other gang members, etc. Nonetheless, particularly for increasing recidivism, there is a strong desire to permit frequent communications with family members and other good and positively influential friends.
One type of individual that is often overlooked in the context of controlled environment facilities are employees. Most employees of such facilities undergo an initial security screening process that includes a background check. A successful screen gives the employer peace of mind to entrust the employee to carry out his/her responsibilities in good faith. However, occasionally, a controlled environment employee will begin fraternizing with inmates, which is usually permitted out of a concern for corruption. Even more occasionally, such an employee will become corrupted and begin performing bad or illegal acts, some of which can be captured in communications processed by the communication system for the facility. Because of their “authorized” status, the employee's actions often go undetected. This can create a significant danger for the other employees, and even the residents, of the controlled environment facility, and should nonetheless be prevented for purposes of thwarting those bad/illegal actions. Therefore, a system is disclosed herein to not only carry out typical call authentication and monitoring, but to also perform an additional security scan of communications to detect the presence of an employee. This, and other aspects, are described in detail below.
In an embodiment the wireless communication devices 104 are facility-issued Personal Inmate Devices (PIDs). The PIDs are in the form of a tablet computing device or a cellular telephone device and are secured from communications with outside cellular towers. The PIDs include significant security and authentication measures to ensure proper usage by proper inmates. An example embodiment of a wireless communication device 104 is described in U.S. application Ser. No. 13/946,637 (now U.S. Pat. No. 9,307,386) filed on Apr. 5, 2016, entitled Multifunction Wireless Device, which is hereby incorporated by reference in its entirety.
One or more computer terminals 110 are also included within the environment 100. In an embodiment, the computer terminal 110 is a video conferencing terminal capable of facilitating a video communication (such as a video conference, or a video call). Such computer terminal 110 is subject to the same or similar authentication requirements as other communication devices within the environment 100. In an embodiment, the computer terminal 110 may also implement additional security measures due to the nature of video communications, such as facial framing (e.g., requiring a face to remain in a frame of the camera), detection prohibited motions and gestures, etc. An exemplary embodiment of such a computer terminal 110 is described in U.S. application Ser. No. 15/002,073 filed on Jan. 20, 2016, entitled Secure Video Visitation System, which is hereby incorporated by reference in its entirety.
The facility-based environment 100 also includes a communication system 150 located on-site at the facility for carrying out all manner of communication processing. In an embodiment, devices, such as hardwired telephones 102 and computer terminal 100, are wire-connected to the communication system 150, whereas wireless communication devices 104 are wirelessly connected to the communication system 150. In order to facilitate the wireless connections to the communication system 150, a router (or other wireless access point) 106 is connected to the communication system 150. The router 106 includes antenna 107 to receive electromagnetic radiation of transmissions from the wireless communication devices 104. These signals are decoded and/or demodulated by the router 106 into a form that is compatible with the communication system. Although not shown, a switch or other routing device can perform similar functionality for coalescing the signals generated by the hardwired devices (e.g., hardwired telephones 102 and computer terminal 110).
Also connected to the communication system 150 is an administrative terminal 115. The administrative terminal 115 is accessible only by authorized personnel of the controlled environment facility. The administrative terminal 115 allows personnel to perform administrative tasks, such as review call logs, register new inmates, monitor recorded or live communications, edit database entries, etc. This information flows into the communication system 150, which functions both as the communication processing server and central data hub for the facility. In alternative embodiments, data storage is not maintained directly within the communication system 150, but rather separate from the communication system, either nearby or at a remote facility.
Additionally, in an embodiment, the centralized communication system 450 leaves certain functional responsibilities with the individual facilities. For example, since the centralized communication system 450 is located centrally to multiple facilities, the system 450 is in the network, and possibly within the public network. Access to the public network is typically carefully guarded. As a result, caller authentication may be retained at the facility in order to restrict network access only to properly authenticated individuals. Other functionality described with respect to the communication system, below, may also optionally be retained at the facility 100.
The authentication system 210 includes data collection 230 and an authentication engine 240, and is responsible for acquiring, processing, and authenticating identification information of at least a calling party. As illustrated, the authentication system 210 also includes an inmate database 250 and an employee database 260. However, it should be understood that the databases 250 and 260 can be located elsewhere and be accessible by the authentication system 210. The databases 250/260 are repeatedly updated with new identification information upon new admittances/hirings.
For example, the inmate database includes all manner of information relating to inmates of the controlled environment facility 100. Such information may include inmate name, call restrictions, number white/black list, personal identification number, biometric reference data, financial information, etc. The inmate database 250 is updated each time a new inmate is admitted to the facility. Upon admittance, a registration process occurs, in which authorized personnel use the administrative tel 115 to generate an inmate data record for the inmate that includes the above-described information. Some of this information is manually entered, whereas others is received from an input device. In an embodiment, at least the biometric reference data is received from an input device, such as a biometric sensor. In an embodiment, the biometric sensor may include a microphone, camera, pressure pad, infrared detector, etc. for purposes of capturing voice data, facial information, fingerprint data, heat signatures, respectively. Other biometric data is envisioned that can be captured using other types of biometric sensing devices. After all necessary information has been captured, the information is organized and stored in the database as part of the registering inmate's data record.
In an embodiment, the inmate database 250 and the employee database 260 store former individuals as well as current individuals. For example, the inmate database 250 also stores inmate data records for former inmates (e.g., inmates that previously resided within the controlled-environment facility, but have since been released, etc.) that were registered in the database. Likewise, the employee database 260 stores employee data records for former employees (e.g., employees that were previously employed with the facility, jurisdiction, etc., but which are no longer employed). In embodiments, the employee database 260 can also include applicants for employment, but were never actually employed.
A similar process to that described above with respect to inmates is also carried out for new employees. However, for each new employee, employee data records are stored in the employee database 260.
With the databases 250 and 260 populated with inmate and employee data records, respectively, call participant authentication and monitoring can be adequately performed. For example, when an inmate seeks to establish a communication, whether by telephone, video or otherwise (hereinafter “a call”), that inmate is first authenticated by the authentication system 210. The outgoing call is received by the authentication system 210. The system prompts 220 the caller to perform certain tasks to satisfy the authentication process. In an embodiment, the prompts are carried out by an interactive voice response (IVR) system that issues voice commands. In response to the prompts, the inmate first enter certain identification information, such as a PIN or other identifier to identify himself. Data provided by the inmate is received and processed by data collection 230. The data collection 230 coordinates with the prompts 220 to identify the type of information received. Based on the received information and the identified type, the authentication engine 240 carries out the authentication process.
For example, in response to the inmate entering the identification information, the authentication retrieves the corresponding inmate data record from the inmate database 250. After receipt of the identification information, and retrieval of the relevant inmate data record, the inmate is prompted to enter secondary identification information, usually in the form of biometric data. The data collection 230 receives the entered data, and identifies its type (as fingerprint, voice, facial data, etc.). The authentication engine 240 then retrieves the biometric data of a like type form the retrieved inmate data record to perform statistical matching. In some cases, the biometric data received from the inmate can be processed in raw form. However, other types, such as voice data for example, requires certain front-end processing (such as Fourier transforming, filtering, etc.). The authentication engine 240 performs any necessary front-end processing, and then performs the statistical matching to the retrieved biometric data from the inmate data record.
If the statistical matching process shows a correlation between the two biometric samples that exceeds some predetermined threshold, then the inmate is authenticated and is permitted to access the network for purposes of attempting to establish the desired communication. However, if the statistical matching process shows a correlation that falls below the predetermined threshold, then the authentication fails and the inmate is prohibited from accessing the network. In embodiments, a predetermined number of failed attempts may be permitted before permanently terminating the access attempt. The authentication system 210 forwards an “AUTHENTICATION SUCCESS” or “AUTHENTICATION FAIL” notification to the call processing 270 based on the authentication result.
In an embodiment, the same method as described above can be carried out for employee communications, except that the authentication engine retrieves a relevant employee data record from the employee database based on the provided identification information.
The call processing system 270 receives the notification from the authentication system 210 as to whether authentication succeeded or failed. Upon failure, the call authorization 280 of the call processing 270 terminates the call and issues an alert to relevant personnel. On the other hand, upon successful authentication, the call authorization 280 provides network access to the caller via call routing 290. The call routing 290 forwards the call to a desired destination or next node of the network.
As the call proceeds, the call processing 270 continues to monitor the call for inappropriate participants, language, etc. Call monitoring 295 links into the communication channel of the call in order to monitor the language and activities of the ongoing communication. The functionality of the call monitoring 295 is further described with respect to
Although the system has been described above with respect to real-time “live” communications, the disclosure is not limited to such an embodiment. In another embodiment, the system can function on previously-recorded calls. For example, the identification information submitted during the call for authentication purposes can be stored along with the audio data of the call. Then, at a later time, the data is compared against the data records stored in the inmate database 250 and employee database 260.
In embodiments, the system described above can also function on in-person communications, such as visitations. When a visitation is conducted across safety glass, as is common, telephone lines connect the parties on the opposite sides of the glass so that they can converse. In this embodiment, those telephone lines can output the audio data to the call processing system 270 for comparison to the data records in the inmate database 250 and employee database 260. When an in-person communication does not use telephone lines, hidden microphones can capture the audio of the in-person conversation.
In the call monitoring system 300, data sampling 310 is tapped into the audio and/or video of an ongoing communication. The data sampling 310 acquires data samples of different participants at different times throughout the communication. In an embodiment, data samples are captured at regular intervals. In other embodiments, performs speaker identification for purposes of sampling different speakers. In this process, the data sampling maintains an ongoing recording window of the communication for process, and detects transitions in communication from one speaker to another through analysis and audio cues. Sampling is performed for audio/video portions corresponding to those transitions in order to capture different speakers at different times of the communication.
The data sampling forwards data samples to data processing 320. Data processing performs any necessary front end signal processing on the received data samples. As discussed above, such processing may include any data processing beneficial for, or necessary for, obtaining a usable data sample, such as filtering, frequency transforming, etc. Data processing 320 forwards the processed data samples to the matching 330. The matching undertakes a stepwise matching process for determining an identity of a participant associated with the sample.
As shown in
If no caller data has yet been stored, then the matching performs matching of the data sample against all other inmate biometric data and employee biometric data to determine if the caller is communicating with another inmate or an employee of the facility. In an embodiment, matching may be performed against a subset of the inmate data records and/or employee data records. If a match is detected from either of these matching processes, then the matching issues an alert to relevant personnel and terminates the call. In an embodiment, the matching sends the alert, but does not terminate the call, instead triggering call recording (if not already underway) for investigative purposes. If, on the other hand, no match is found among the inmate and employee databases, then the data sample is stored as that of the called party 350.
Later in the call, when the matching 330 determines that a given sample is not that of the calling inmate's, then a comparison is made to the stored called party sample 350. A match to the called party sample causes the matching 330 to take no immediate action with respect to the call. However, if the data sample does not match the called party sample, 350, then matching determines that a third party has joined the call. As a result, the matching checks the data sample against the inmate database 250 and employee database 260 in the manner previously described, and then issues an alert to relevant personnel along with the identified third party (if matched to an inmate or employee). As a result of these processes, the call monitoring 300 is able to detect communications involving an employee of the facility.
Although the above has been described with respect to an employee of the facility 100, the functionality of the matching 330 can also be expanded to check against employees of other facilities. However, reactionary measures taken by the matching 330 in response to such a match should be tempered relative to a match of an employee of the immediate facility 100, as such a communication may not be prohibited or involve nefarious behavior. Therefore, in an embodiment, the call is permitted to proceed, but flagged for later review. In another embodiment, following review by authorized personnel, the detected employee call participant may be added to a list of authorized participants, such that future detections will not cause a response from matching 330.
As shown in
As part of the registration 505/515, a biometric sample of the inmate is stored 510 with identifying information of the inmate, such as a PIN, in the form of an inmate data record. Likewise, following employee registration 515, a biometric sample is stored 520 in association with identification information of the employee in the form of an employee data record.
After registration, the communication system 150/450 receives an access attempt 530 from a caller. The caller submits identification information and biometric data 540 to the communication system 150/450. Using the identification information, the system retrieves a data record from a corresponding database 550. Utilizing the biometric data previously stored in the retrieved data record, a matching process is carried out to determine whether the submitted biometric data sample matches the retrieved biometric sample of the same type 560. The access attempt is then allowed or denied 570 based on the results of the matching process.
During an ongoing communication, the communication is sampled 610. The sample may be in the form of audio data, facial data, or other data capable of being used to identify a call participant. The sample may be acquired at periodic intervals, or based on other criteria, such as detected speaker transitions, etc. Signal processing 620 is then performed on the acquired data sample in order to place the sample in a form usable for analysis. Such processing may include filtering, frequency transforming, etc.
Once the sample is in a good useable condition, the sample is statistically compared 630 to a biometric sample of the same type associated with the data record of the caller. A determination is then made, based on the comparison, as to whether the samples are a statistical match 634. If a match is detected (634-Y), the sample is identified as belonging to the previously-authenticated caller, and the method begins again 680.
If a match is not is not detected (634-N), then a determination is made as to whether a called party biometric sample has previously been stored 638. If no previously-stored called party biometric sample exists (638-N), then the sample is compared 640 against biometric samples of the same type of each of the inmate data records and employee data records. A determination is then made as to whether the sample is a statistical match to any of those data record biometric samples 645. If a match is detected (645-Y), then remedial action is taken 690, such as by the issuing of an alert and the terminating of the call. On the other hand, if no match is detected (645-N), then the sample is stored 650 as the called party biometric sample. The method then begins again 680.
Meanwhile, if the sample is determined not to belong to the caller (634-N), and there is already a previously-stored called party biometric sample (638-Y), then the sample is compared to the previously stored called party biometric sample 660. A determination is then made as to whether the sample matches the previously stored called party biometric sample 665. If a match is detected (665-Y), then the method begins again 680. If on the other hand, no match is detected (665-N), then the sample is compared 670 against the biometric data stored in the data records of the inmate database 250 and employee database 260. The call is then terminated and an alert is generated 690 to notify relevant personnel of a detected unauthorized third party on the call, and an identity of the unauthorized third party if a match was detected in either the inmate database 250 or the employee database 260.
The method continues in the manner described above until the call is terminated, whether by the communication system, the caller, the called party, or via other means.
Although the systems described above were with respect to real-time “live” communications, the disclosure is not limited to such an embodiment. In another embodiment, the system can function on previously-recorded calls. For example, the identification information submitted during the call for authentication purposes can be stored along with the audio data of the call. Then, at a later time, the identification data and/or the audio data can be analyzed to extract the biometric data samples. Those biometric data samples can then be compared against the data records stored in the inmate database 250 and employee database 260, in the same manner as described above, but after the communication has occurred.
In embodiments, the system described above can also function on in-person communications, such as visitations. When a visitation is conducted across safety glass, as is common, telephone lines connect the parties on the opposite sides of the glass so that they can converse. In this embodiment, those telephone lines can output the audio data to the call processing system 270 for comparison to the data records in the inmate database 250 and employee database 260. When an in-person communication does not use telephone lines, hidden microphones can capture the audio of the in-person conversation
It will be apparent to persons skilled in the relevant art(s) that various elements and features of the present disclosure, as described herein, can be implemented in hardware using analog and/or digital circuits, in software, through the execution of computer instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software.
The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. For example, the methods of
Computer system 700 includes one or more processors, such as processor 704. Processor 704 can be a special purpose or a general purpose digital signal processor. Processor 704 is connected to a communication infrastructure 702 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures.
Computer system 700 also includes a main memory 706, preferably random access memory (RAM), and may also include a secondary memory 708. Secondary memory 708 may include, for example, a hard disk drive 710 and/or a removable storage drive 712, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like. Removable storage drive 712 reads from and/or writes to a removable storage unit 716 in a well-known manner. Removable storage unit 716 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 712. As will be appreciated by persons skilled in the relevant art(s), removable storage unit 716 includes a computer usable storage medium having stored therein computer software and/or data.
In alternative implementations, secondary memory 708 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 700. Such means may include, for example, a removable storage unit 718 and an interface 714. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 718 and interfaces 714 which allow software and data to be transferred from removable storage unit 718 to computer system 700.
Computer system 700 may also include a communications interface 720. Communications interface 720 allows software and data to be transferred between computer system 700 and external devices. Examples of communications interface 720 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 720 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 720. These signals are provided to communications interface 720 via a communications path 722. Communications path 722 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.
As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 716 and 718 or a hard disk installed in hard disk drive 710. These computer program products are means for providing software to computer system 700.
Computer programs (also called computer control logic) are stored in main memory 806 and/or secondary memory 708. Computer programs may also be received via communications interface 720. Such computer programs, when executed, enable the computer system 700 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 704 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 700. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 700 using removable storage drive 712, interface 714, or communications interface 720.
In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).
It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.
The disclosure has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.