1. Field of the Invention
The present invention relates to wireless telephone service. More specifically, the present invention relates to wireless telephones and systems for validating, placing and monitoring calls.
2. Background of the Invention
Service providers provide pay-phone services at correctional facilities. These services allow inmates to make collect calls from a pay phone to their loved ones and family members. Four options exist presently to pay for correctional calls: collect, debit, prepaid cards, and advance pay or prepaid collect. The bad debt associated with correctional collect calling generally continues to exceed 30%. Service providers for correctional facilities have implemented use of debit, prepaid card, and advance pay solutions to manage bad debt. These debit, prepaid card, and advance pay solutions are generally dependent upon outside vendor services.
As technology has advanced, service providers have partnered with a number of different companies to control the calling patterns of inmates and work with law enforcement to provide them services related to those calls. Existing services include recording of calls, blocking calls to certain numbers, preventing the inmate from calling a friend who would then use three-way calling to reach out to another party who might be unauthorized for that person to call, etc.
The existing technology in correctional facilities is wire-line or VoIP based and requires a great deal of infrastructure at the facility. The existing technology requires technology platforms at the correctional facility or centrally located that are used to record the calls and provide all of the blocking and other items that are related to the requirements of the correctional facility. With the existing infrastructure comes a great cost to maintain the equipment at the site, to maintain the infrastructure, to provide a special location at the correctional facility to handle many or all of the call controls, and provide for the platform that handles call controls.
Existing pay phones that inmates use are similar to those seen on city streets, modified somewhat such that they do not have a coin box. The design is generally such that the telephone is on the wall with a corded handset. Some exceptions are present, including a hands-free set. This hands-free set allows an inmate to use an on-the-wall device by talking into a microphone. In all instances, the current infrastructure is a hardware device that has to be placed within the cells, dayrooms, pods, or whatever location of the correctional facility that is available for the inmates to use the telephone. The situation requires the service provider technicians to travel to the site to work on the equipment. This is a huge security risk, it takes a lot of time, and it is very expensive.
Problems with network cable, house cable, telephone units, etc., require service at the actual site. For instance, if a telephone unit requires a repair, the telephone company or equipment provider must send a technician into the facility to make the repair. However, sending a technician into a correctional facility becomes a huge security issue, both for the technician and the facility. The technician's safety must be accounted for at all times and it may be necessary to move inmates from an area. Additionally, the facility must make sure that the technician does not leave any foreign objects.
What is needed is a solution to provide telephone service to inmates, along with necessary validation and call controls, without requiring on-site visits by technicians.
The present invention is a visually distinct and tamper-resistant wireless telephone and a system for issuing the telephone, validating a call, and monitoring the call. This solution uses a durable wireless telephone design. Prepaid correctional wireless telephones are issued to inmates at correctional facilities. A system restricts calling to a centralized call control platform and performs validation, call detail data collection and storage, security, and ancillary features. The call detail data collection and storage is used for records and auditing purposes. Ancillary features include recording, three-way call detection, etc. A method is employed which validates a user's call and monitors the contents for security.
In one exemplary embodiment, the present invention is a wireless communication system. The wireless communication system includes a visually distinct and tamper-resistant wireless telephone, a call control platform in communication with the telephone, a database in communication with the call control platform, and a call control logic onboard the call control platform. A call is validated by the call control logic prior to allowance then monitored and recorded into the database.
In another exemplary embodiment, the present invention is a wireless communication system. The wireless communication system includes a wireless telephone, a call control platform in communication with the telephone, a database in communication with the call control platform, and a call control logic onboard the call control platform. A call is validated by the call control logic prior to allowance then monitored and recorded into the database.
In a further exemplary embodiment, the present invention is a method of controlling wireless communication. The method of controlling wireless communication includes receiving a call attempt from a wireless telephone at a call control platform in communication with the telephone, validating the call attempt, allowing a call based on the call attempt, and monitoring the call. The call attempt is received and validated by a call control platform, prior to allowing the call.
In yet another embodiment, the present invention is a software program stored on a computer readable medium for controlling wireless communication. The software program includes a first code segment for receiving a call attempt from the wireless telephone at a call control center in communication with the telephone, a second code segment for validating the call attempt, a third code segment for allowing a call based on the call attempt, and a fourth code segment for monitoring the call. The call attempt is received and validated by a call control platform, prior to allowing the call, and then the call is monitored and recorded into a database.
The present invention is a visually distinct and tamper-resistant wireless telephone and a system for issuing the telephone, validating a call, and monitoring the call. This solution uses a durable wireless telephone design. Prepaid correctional wireless telephones are issued to inmates at correctional facilities. A system restricts calling to a centralized call control platform and performs validation, call detail data collection and storage, security, and ancillary features. The call detail data collection and storage is used for records and auditing purposes. Ancillary features include recording, three-way call detection, etc. A method is employed which validates a user's call and monitors the contents for security.
“Wireless telephone,” as used herein and throughout this disclosure, refers to a device capable of voice transmission and reception through a wireless connection. Examples of a wireless telephone include a cellular telephone, a cordless telephone, a personal digital assistant (PDA) employing voice transmission software, etc.
For the following description, it can be assumed that most correspondingly labeled structures across the figures (e.g., 132 and 232, etc.) possess the same characteristics and are subject to the same structure and function. If there is a difference between correspondingly labeled elements that is not pointed out, and this difference results in a non-corresponding structure or function of an element for a particular embodiment, then that conflicting description given for that particular embodiment shall govern.
The disclosed wireless system relies upon inmates using wireless telephones. These wireless telephones may be given to each inmate such that they remain with the inmate, or attached to a wall, cell, etc. to remain in a single location. In embodiments where inmates are each given their own wireless telephones, each wireless telephone is durable and distinct. These characteristics allow for wireless telephones that have been smuggled into a facility to be easily spotted. The durability provides for long lasting use. An embodiment of a wireless telephone is shown in
In other exemplary embodiments, the housing of the wireless telephone is constructed using rivets instead of screws so that it cannot be easily pried apart. The housing could also snap together in a fashion preventing it from being opened without the use of a custom tool. Embodiments of the housing should be light in weight so that an inmate cannot use it as a weapon via its sheer weight. If a correctional facility insists upon having a metal housing, a rubber covering can serve as protection.
Wireless telephone 100's design is unique to differentiate it from any other wireless telephones to ensure wireless telephone smuggling into facilities is not promoted by wireless telephone 100's use. For example, wireless telephone 100 is bulky and is a certain distinct color, such as bright orange. Wireless telephone 100 is large enough for correctional facility personnel to see when it is in use.
Keypad 106 allows a user to enter numbers in order to place a call. Once the numbers are entered, the user presses talk button 108 to place the call. Display 102 allows a user to view a number being dialed. Display 102 may also allow the user to view an incoming number or caller ID, if an incoming capability is enabled. When the user has completed the call, the user presses end button 109 to end the call. Antenna 104 provides for the transmission and reception of cellular signals. This allows wireless telephone 100 to communicate with the network. Antenna 104 is preferably a material that is not easily sharpened or antenna 104 may be within the housing of wireless telephone 100, thereby reducing the possibility of using wireless telephone 100 as a weapon.
In exemplary embodiments of the present invention, a user is required to enter a Prisoner Identification Number (PIN) or other form of identification before placing a call. A PIN requirement may help discourage theft of wireless telephones from prisoners or the use of wireless telephones for bartering. These identifications may be periodically changed to preclude use of lost or stolen wireless telephones.
Wireless telephones must be rechargeable such that they may be used without replacing batteries or connecting to a wired network. Therefore, a “charging bank” or similar device is necessary to charge mass numbers of wireless telephones. Collecting wireless telephones to charge allows a facility to determine whether wireless telephones have been lost or stolen. Lost or stolen phones may be disabled such that they are not used improperly. This may be accomplished by removing a wireless telephone's ID from the network.
In giving durable and distinct wireless telephones to inmates, a system is necessary to control the use of these devices. In environments such as a correctional facility, calls must be verified and screened to prevent unauthorized uses and often recorded for records purposes. Many other aspects of the call, such as the number and time of the call, must also be recorded and stored.
Often, a correctional officer may wish to screen calls from inmates. Because all calls are routed through call control platform 320, officials may listen in using call screening device 330. Call screening device 330 may be headphones, a computer, etc. Correctional officers may also listen to calls stored in call records database 324. While listening to a call, an official may determine that a call is unauthorized. In this occurrence, a correctional officer may use kill button 332 to disconnect the call. Additionally, kill button 332 may be used to shut down the entire system. Kill button 332 may be a button or command and may be internal or external to call screening device 330.
In other exemplary embodiments the database stores all of the call detail including where the inmate calls from, where the inmate calls, the length of the call, etc. These call details can be kept in a centralized location so information can be analyzed and provided back to law enforcement personnel so they can determine what kind of calling activity is occurring.
In exemplary embodiments of the present invention, an existing central platform may be used. Inmate service providers today have centralized platforms that may be direct dialed from the cellular service to perform security and controls. This existing infrastructure may be manipulated for use in the present invention.
In further embodiments of the present invention, the validation of dialed numbers may be accomplished through an automated system on the server. When a number is dialed, the call control platform receives the request. The server dials the number and prompts the recipient to choose whether or not to accept the call. This may be accomplished by pressing a number, making a verbal statement, etc.
While some may believe cellular phones in the corrections environment impose a security threat, the present invention increases security. In embodiments of the invention, the invention incorporates what is similar to a closed Prisoner Identification Number (PIN) system. Only numbers programmed into the central server may be called from any of the wireless telephones. This concept increases visibility to investigators of what numbers are being dialed by the inmates. It also affords the ability to build a mining database of numbers and information being called from the phones, simplifying investigations. It is critical that other correctional cell phones may never be called by any of these wireless telephones.
In embodiments of the present invention, the signal frequency for the cellular service is unique from other cellular frequencies. Outside frequencies may be blocked or are too weak to be used. Together, this discourages the smuggling of other cellular telephones into the facility because they are useless.
The disclosed system substantially eliminates a service provider's need to visit a facility, reducing operation expenses. These operating expenses are a significant and service impacting issue fielded by all providers today. The system also substantially eliminates cable and wiring at facilities, which is often house cable, or old dilapidated telco cable. The system additionally eliminates collect calling and Advance Pay, which helps eliminate bad debt. The system allows for rate flexibility, and reduces and simplifies billing expenses.
Local police or other groups can have access to the same security features that are referenced herein. This design needs to be dynamic enough to be provisioned for a large or small facility. The centralized call control platform manages the data, the recordings, and the call details. The centralized call control platform may be used in any environment where only specified numbers are to be dialed, calls need to be recorded, call details need to be recorded, etc. For example, embodiments of the invention may be used by a police force in a localized area or by workers on an oil rig. The same methodology as described above for the example of a correctional facility may be applicable to such other environment and uses. These embodiments may use any type of wireless telephone, but basics of the centralized call control platform remain the same.
The foregoing disclosure of the exemplary embodiments of the present invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Many variations and modifications of the embodiments described herein will be apparent to one of ordinary skill in the art in light of the above disclosure. The scope of the invention is to be defined only by the claims appended hereto, and by their equivalents.
Further, in describing representative embodiments of the present invention, the specification may have presented the method and/or process of the present invention as a particular sequence of steps. However, to the extent that the method or process does not rely on the particular order of steps set forth herein, the method or process should not be limited to the particular sequence of steps described. As one of ordinary skill in the art would appreciate, other sequences of steps may be possible. Therefore, the particular order of the steps set forth in the specification should not be construed as limitations on the claims. In addition, the claims directed to the method and/or process of the present invention should not be limited to the performance of their steps in the order written, and one skilled in the art can readily appreciate that the sequences may be varied and still remain within the spirit and scope of the present invention.