System and method for electronic notification in institutional communications

Information

  • Patent Grant
  • 11943393
  • Patent Number
    11,943,393
  • Date Filed
    Thursday, August 6, 2020
    3 years ago
  • Date Issued
    Tuesday, March 26, 2024
    a month ago
Abstract
Disclosed is a multi-mode communication notification system and method for improving communication between an inmate and a third party by enabling a third party to send a web-initiated contact request for a specific inmate and further allowing the inmate to check his/her contact requests or be automatically notified of contact requests. Additionally, the system electronically notifies the third party when the specific inmate has been notified of the contact request. Further, the system notifies the third party if they have missed a call from the specific inmate.
Description
FIELD OF INVENTION

The invention relates generally to the field of telephone communication systems in penal institutions or similar facilities. In particular, the invention relates to a system and method of communication between an inmate and a third party that enables the third party to initiate a web-based contact request for a given inmate. Additionally, the system enables the inmate to automatically check for his/her call requests through an inmate telephone and electronically informs the third party when the inmate has been notified. Further, the invention electronically informs a third party if they have missed a call from a specific inmate.


BACKGROUND OF THE INVENTION

Generally, the need to monitor, control, record and provide detailed records of the usage of a telephone system in a controlled institutional environment is well recognized. It is common to utilize a controlled telephone system capable of monitoring outgoing telephone connections in many types of institutional environments, including penal institutions, military institutions, hospitals, schools, businesses, specific types of government institutions, etc.


The reasons for monitoring and controlling institutional telephone systems are evident. To prevent such institutions from incurring unaccountable telephone costs, the institutions must either restrict access to outbound telephone lines or employ a telephone monitoring system to charge the responsible party for making the outbound communication. Otherwise, unaccountable telephone costs would severely hinder the availability of the telephone systems in institutions. However, the restrictions utilized by these systems result in overall inefficiency as two-thirds of the attempted calls go unanswered presenting a problem for both the system's users and the institution.


It is imperative for many institutions to utilize a communication system that provides an accurate identification means for administrators to determine the individual responsible for each outbound telephone call. A communication system must also be able to monitor communications and maintain a useful record of the communications. Additionally, the system should include the ability to restrict access or provide options to particular users. Considering the number of users in a large institution, different payment methods available and the excessive call volume at many institutions, it is evident that an effective telephone management system is essential.


Providing telephone systems in specific types of highly restricted institutions, such as penal institutions, results in the consideration of numerous additional complicating factors. Generally, the government heavily regulates outbound communications in penal institutions. Therefore, communication systems implemented in penal institutions or similar facilities must meet greater security requirements often mandated by regulatory bodies affiliated with the county, state or federal institution. Thus, the communication system used in a regulated institution must employ unique functions often unnecessary in other types of institutions.


In its most general form, a penal institution's telephone system utilizes a call processor to approve and place a call, surveillance equipment or monitoring equipment, and a recording device for evidencing the conversation. Generally, these simple systems are not equipped to restrict an inmate from calling an individual. However, it is preferable for the call system devices now employed in such institutions to have the capability to thwart an inmate from calling certain specific individuals or types of individuals. Systems currently exist capable of controlling calls. It is well documented that without the necessary constraints on an inmate's use of the telephone system, inmates have often harassed outside parties or individuals. For example, it is generally preferred that an inmate be prevented from placing a telephone call to the prosecutor who prosecuted the inmate's case or another attorney responsible for the sentencing of the inmate. In another example, it may be preferred that an inmate be prevented from contacting the victim of the inmate's crime or witnesses from the inmate's case. Additionally, inmates have used previous penal institution call systems to perpetrate additional criminal activities such as fraudulent schemes or specific criminal' conspiracies. Specifically, inmates have been known to arrange credit card fraud attempts, the smuggling of contraband into the facility, and have even been known to arrange escape attempts over the penal institution's telephone system. Therefore, it is critical that an efficient penal institution carefully monitor all outgoing telephone calls making a regulated penal institution telephone system a necessity.


Another concern in implementing an efficient institution telephone system is cost control. In order for a system to be cost effective, the system must critically monitor and record the activities of each individual user in order to properly charge each individual caller for his or her outgoing calls. Typically, telephone communication systems in penal institutions provide an inmate with a telephone account upon arrival. There are several options for an inmate to select with respect to payment on the account. For example, an inmate may place prior personal earnings into the account. The cost of each call is then deducted from the total amount in the inmate's account until no balance remains. The inmate may also choose to utilize collect call means. In addition, an inmate may be assigned a commissary account, where funds are added to the account based on work performed by the inmate. As the funds increase, the inmate may apply these funds to the cost of placing telephone calls. The inmate debit account may be located onsite, at a central office facility, or at a third-party site.


The inmate's family may alternatively control the inmate debit account. For example, the inmate's family may control the inmate's access to the debit account either remotely (e.g., by using the Internet, accessing a toll-free/pay to dial telephone number, using a mail form, etc.) or by visiting the prison facility. The inmate's family may add funds to the debit account and thereby control the call volume allowed to the inmate.


Another requirement of a secure telephone management system in a penal institution is the accurate identification of the telephone call participants. Generally, it is common in a penal institution to assign each inmate a personal identification number (“PIN”). When an inmate attempts to place a telephone call, the inmate must supply a valid PIN to gain access to the telephone system. Other systems include requiring personal information in addition to a PIN to be supplied by the inmate/user. For example, a user might be prompted to supply a PIN as well as certain information that may only be known to the user. A common example is a request by the call system to provide their mother's maiden name.


Another required feature of a telephone management system for a penal institution or similar facility is a means for restricting calls placed by a user (e.g., an inmate). It is well documented that inmates often try to harass individuals related to their arrest or confinement, such as judges, prosecutors, witnesses, etc., through telephonic communications. Penal institutions have attempted to prevent this harassment by restricting the telephone numbers each inmate is able to access. For example, a system may utilize a PIN or other identification means to, access a list of telephone numbers that the inmate may not call, or alternatively, the system may access a list of numbers that the inmate is authorized to connect to (i.e., the inmate can only call the numbers appearing on the list). Telephone numbers placed on the restricted list can include any individual related to the conviction (e.g., the arresting police officer, the prosecuting attorney, etc.), while telephone numbers placed on the permitted list may include, for example, close family relatives. The system may also limit the amount of time each inmate/user is permitted to conduct each outbound telephone call through the system. Furthermore, restrictions may be regularly updated. For example, if an inmate misbehaves, the inmate's telephone privileges may be further limited or revoked completely.


Penal institutions are also concerned with monitoring the activities and communications of inmates. Monitoring telephone activities is necessary to restrict connections to illegal activities outside of the institution. Three existing types of call monitoring techniques are known in the art. The first technique is live monitoring. Live monitoring requires an operator or other individual to listen to each telephone call and alert the proper authorities if necessary.


The second type of monitoring involves recording the telephone conversation via a common recording device. A common example is a recording device such as a magnetic tape drive or a computer hard drive. This type of monitoring may be continuous or intermittent depending on the degree of security required for each inmate.


The third type of monitoring is known as passive monitoring. Passive monitoring may be activated when certain keywords are spoken. In addition, passive monitoring may be activated if the telephone call at the termination end is transferred to a third party via certain known detection means such as silence detection, hook-flash detection, etc.


Penal institutions currently record most inmate telephone calls, with the exception of lawyer-inmate communications, which are generally prohibited by law. Typically, in the art, monitoring may occur using any combination of the three methods (e.g., live monitoring, electronic recording monitoring or passive monitoring). It can be advantageous to flag certain individuals in an inmate's profile as highly suspicious. If the inmate initiates communication with the flagged individual, the system will alert a live operator to monitor the system. In such a system it is essential that the system correctly identify the called individual to avoid unnecessary expenditure of live operators.


Alternatively, the inmate telephone call system may utilize a remote-alert notification system wherein the system contacts an operator when a violation has occurred. The system may contact the operator utilizing telephone means, paging means, computer means, etc. This notification system may be set to call the operator a limited number of times or until the alert has been noted in the inmate telephone call system. The operator may then access information about the alert remotely using the telephone, Internet, or any other such remote access means.


In order to alleviate some of the problems and concerns discussed herein, many penal institutions have implemented certain task-specific advanced systems. Generally, these “advanced” systems known in the art comprise several features. For example, it is known in current systems to employ permanent call blocking. Specifically, it is known in the art to block an inmate or group of inmates from dialing certain telephone numbers. Most systems also prevent inmates from talking directly to live operators. This prevents inmates from requesting that the operator forward a call or provide additional telephone numbers allowing inmates to harass or locate additional parties. Furthermore, current systems block “1-800,” “1-900” and other like telephone numbers including toll-free and pay to-dial telephone numbers. In addition, certain institutions may elect to block country codes, specific area codes, or other third-party numbers.


Current systems known in the art may also utilize a feature commonly referred to as “selective” call blocking. As discussed, “selective” call blocking may be employed to thwart inmates from establishing a connection with a selected group of individuals (i.e., with the home telephone of prison guards, wardens, indictment witnesses, trial witnesses, police officers, judges, etc.). It is also foreseeable that the telephone numbers of the family members of these specific individuals may also be blocked.


Some current systems also limit the use of specific long distance carriers. This feature proves useful in limiting unnecessary costs incurred by employing alternate carriers.


Other current systems utilize features commonly referred to as “hook flash” prevention or “click” and “pop” prevention modes. These systems prevent inmates from extending the current outgoing telephone call and entering a new telephone call with a new number without fully terminating the original telephone call. For example, this feature prevents an inmate from utilizing common call forwarding features and the like.


In addition, some current institutional telephone systems electronically or manually disable the keypad after a telephone number is dialed and the telephone call is connected. This feature prevents inmates from interacting with telephone games and lotteries, and in certain older systems, prevents the inmate from achieving an unrestricted dial tone.


Another common feature employed by institutional systems is three-way call prevention. This feature prevents an inmate from instructing the called party to bridge the telephone call to another telephone number.


Other known systems in the art may exhibit other regulatory features. For example, telephone communication systems generally allow an institution to limit the duration of a telephone call or to limit the cost of the telephone call. These types of features further allow a facility to customize the telephone call systems thereby preventing unrecoverable expenditures.


Another control used by current institution telephone systems is the use of certain aspects of biometric recognition for the identification of users or inmates (i.e., the calling party). It may be beneficial for communication systems in penal institutions to incorporate biometrics as an additional security device. Biometric recognition is commonly available in a number of fields. For example, biometrics recognition has found a number of security uses, including common usage, in credit card systems and building security systems. Biometric information includes fingerprints, hand geometry, voiceprints, retinal patterns, iris scans, signatures, infrared facial patterns, and all other sources which constitute unique physiological characteristics and which can assist in establishing a person's identity. Various devices exist which can scan one or more biometric characteristics and digitize the information.


Generally, while much effort has been made to establish controlled inmate telephonic communication, inmate call management, systems are inefficient. Studies have shown that approximately two-thirds of all calls attempted by an inmate to an outside party are not answered by a live party (i.e., no answer or an answer by an automated message machine). These unanswered calls present a problem for inmates as they often count against their monthly limit thereby reducing the time available for inmates to talk to such people as family members. Currently, the Federal Bureau of Prisons has a three hundred (300) minute per month limit for many inmates. It may take the inmate several attempts to successfully contact an outside party or the inmate may never successfully contact a desired outside party.


In addition, inmates and their outside contacts often complain of the difficulty to communicate via live telephone conversations as they are often several time zones away from each other. Due to the lack of successful completions of calls (i.e., only one-third of attempted calls are successful), inmates try to find a way to get around the system resulting in even more restrictions placed on usage of the system. Additionally, these unanswered calls present a loss of revenue for the institution, as it is difficult to charge for system usage if the call is not answered.


A system is thus desirable that increases the care and efficiency of communication between inmates and third parties. The system notifies the third parties when an inmate has tried to contact them. The system also allows the third party who receives the notification to reply with a message to the inmate. The system further enables authorized third parties to access the system and request to contact an inmate at any time, regardless of whether the inmate has tried to contact the third party. Advantageously, this will increase efficiency as well as generate an additional revenue stream for the institution. However, due to factors such as government regulations, such a system must be monitored and controlled in similar manners to current call management systems. The system also allows for live talk between the inmate and outside party if the third party answers the call, record the conversation as necessary, bill for usage of the system, etc.


One system known in the art discloses an automatic account number validation and billing management system. The system prompts a user for an account number and compares the number inputted to a number stored in a database to determine validity. If the account number is valid and found in the database, the system completes the predetermined telephonic connection. If the number is not in the database, and therefore invalid, the system will utilize voice prompts to request re-entry of the number or provide further instructions. The system attempts to locally automate and simplify the process of payment for routing calls without live operator assistance, but does not address additional security concerns that may exist in specific facilities, such as in a penal institution. Furthermore, it does not provide for protection measures to confirm that the individual supplying the account number is the individual entitled to the use of the account. In such a hostile environment as a penal institution, an account number may easily be obtainable through coercion or by force. The system does not provide any means of monitoring the conversations taking place or restricting which individuals are accessed by the user. Additionally, the system does not provide means for contact request from a third party for a specific inmate or notification to an outside party if the inmate's call is unanswered.


Another system known in the art discloses a call management system enabling prepayment of telephone calls utilizing a debit system. Specifically, a user of the system obtains a special code by depositing a prepayment. The prepayment is stored in a database for use in verifying calling party calls. To access the system, a user dials a special number and inputs a user-specific code for verification followed by the number of the party to be called. Next, the code is verified by the system. If verification is successful and sufficient funds are available, the call is connected. The prepayment amount, minus deductions for the running cost of the call, is tabulated as the call progresses. The call terminates either when the prepaid funds are exhausted in the user's account or when either party disconnects. The invention also includes steps to prevent the same access code from being used at different terminals. However, the system does not teach a means for selecting the call type or a call monitoring means. It also fails to teach an advanced verification means specific to a user. Further, it does not provide a means of notification to the outside party if the inmate's call is not answered.


Yet another system known in the art teaches a multilingual prepaid telephone system capable of interfacing with a public switched telephone network. In the system, each user is assigned a PIN and a credit account. A user first dials a number to access the telephone system and chooses a language for all subsequent voice prompts. The user then supplies a PIN, which is compared against a list of numbers in a database. If sufficient credit is available for the duration of a telephone call to the destination number, the connection is completed and a timer is set for the available duration of the call. The call terminates either when the allowed amount of time for the call expires or if one party member hangs up the telephone line. If the latter situation occurs, the system computes a new available credit balance for the user's account. However, the system fails to provide a selection means for the user, such as the ability to choose the type of call to be placed (e.g., collect, debit, international, etc.): It also fails to teach any call monitoring means and would therefore be unacceptable as a communication system for a penal institution. Additionally, it does not teach any contact request/notification means.


Still another system discusses an integrated commissary system for receiving and processing orders in an institutional setting. The commissary system is designed for use without access to a PSTN. According to the system, user status and inventory status are stored in an onsite database. To access the database, a user provides identifier information and item selections through selected telephones. The selections are compared against the onsite database using a processor. If the user is authenticated and the requested items are available, the processor generates transaction records, updates user commissary information, and correctly adjusts inventory. The updated information is stored in a file that may be used for record keeping or archival purposes. However, the system does not teach a commissary system for use with a PSTN or any contact request/notification means. This system also fails to teach multiple authentication means and would therefore be unacceptable for use in a penal institution.


Still a different system known in the art discloses a software process for real-time call rating and debiting so that a subscriber's account balance is not exceeded. The method disclosed estimates the time when the user's balance will expire by using the total charge per second average. The process then determines the time remaining by dividing the account balance by the average charge per second of all telephone calls, and the time limit for the call is then set accordingly. This method is useful if the rate for long distance calls is not known locally. However, the system does not allow for other types of calls, such as collect calls, to take place. Further, it fails to provide an advanced call monitoring apparatus with an advanced authentication apparatus. Also, it fails to teach a multi-mode communication notification means with a specific contact.


There is also a system that depicts an automated public telephone control for charge or collect call billing. The apparatus embodies a microprocessor system controlling voice prompting, recognition of responses, network signaling, recording of calling details, and verification of account numbers. The disclosed invention provides for an automated telephone billing for public telephone systems. The system offers a plurality of billing methods, such as billing to a credit account number, to the called party (collect calling), or to a third party. An additional aspect of the invention describes the recognition of voice utterances from other signals and called party spoken words (i.e., the system can recognize the word “yes” when spoken by any individual). However, it does not identify or verify the individual speaking. Furthermore, this system does not provide a means to identify the user or verify that the user is not partaking in fraudulent activities. It also fails to teach of a monitoring, call control, and contact request/notification means.


Yet still another system depicts a collect call, system that can automatically route long distance calls without intervention of an outside service or operator. This feature enables private public telephone owners, as opposed to primary telephone companies, to receive revenue for completion of the call. The invention comprises the steps of providing the calling party with voice prompts, receiving voice or dialed signal information about the calling party in response to the voice prompts, locally, recording the information about the calling party, providing the called party information about the calling party, and reacting to a variety of provided signals by either the called or calling party. The system only provides a method and apparatus for placing collect calls. In addition, it avoids consideration of providing other possible payment methods. The system disclosed is further limited by its lack of telephone call monitoring ability and calling party identification means, and is therefore unsuitable for use in penal institutions.


Still a different system exemplifies the need for a control management and monitoring system in institutional settings. This system discloses a system for controlling, monitoring, recording and reporting telephone communications. The system deals primarily with the identification of a user through use of a PIN and restricting telephone communications through a profile accessed by the PIN. The system further contemplates means for monitoring and recording communications. However, the system only enables live talk between parties and provides no means for contact requests by an outside party for a specific inmate and notification if a call is unanswered.


Even another system is primarily concerned with incorporating an improved method of monitoring calls. The method includes a means for detecting tones commonly associated with call bridging and call forwarding attempts. For example, the system is directed to the detection of tones such as ring signals, busy signals, special information tones, dual tone multi-frequency tones, call progress tones or other similar tones characteristic of the placement of a telephone call. It is limited by detection of certain sounds, which may not be readily machine-recognizable. For example, it is foreseeable that interference, background noise, or compressed voice data may inhibit the detection of the tones. Also, the system does not teach any method for multi-mode communication notification means.


Another system known in the art describes a system for the verification of a calling party, called party and a secure connection. The invention includes the costly requirement of secure telephone devices known in the art. Specifically, the invention teaches a system wherein the calling and called parties supply voice data, which is encoded and transmitted over a telephone network. Both users hear the alternate party's recorded voice data and verify that the supplied voice data is correct. The call is established only if both parties verify that the called party has provided the correct voice data. However, it would be too costly to implement such a system in a penal institution or similar facility. Additionally, the system does not consider possible payment methods for calls or call management. For example, certain inmates may be entitled to call only a few particular individuals. A system within penal institutions, or similar facilities, must include a means for limiting the number of potential called parties and the specific parties to which inmates can call and provide a means for monitoring inmate call transactions.


Further, a different system discloses a system to permit users repetitive access to a multitude of systems. The system requires an initial enrollment phase for access. The enrollment phase consists of extracting biometric data to be stored for future use. The format of the data is compatible with a plurality of verification/identification systems. For example, in one embodiment, it describes a biometric recognition means including voice recognition, fingerprint identification, and retinal scan identification. However, it does not address restrictions to the system or further monitoring means during use of the system, which are essential for systems within a penal institution.


Finally, a system known in the art provides a methodology for a computerized telecommunications system for voice to text message storage for use in correctional facilities. This system receives an external message via either voice or text. There are two storage means: a voice message box or an email inbox. If a voice message is received, it passes as a regular telephonic voice message and is then stored as a voice message in the voice message box. If instead, the storage unit is an email box and a voice message is received, the voice message is converted to text and the message is then saved. The reverse happens if the message is a text message and the storage medium is a voice message box. If a text message is received and the inmate has an email inbox, the text message is saved as text. The inmate is then notified of the new message. This system can also allow the inmate to send either a text or a voice message to an external party. If the inmate leaves a voice message, no conversion occurs and the message is sent. However, if an inmate's message is in text form, either a text to voice conversion occurs before being sent to the outside party or the text message is sent to the external party. This system requires an external party have access to-the system to receive a contact request sent by an inmate. The external party must constantly check the system to determine whether they have new requests. Only upon accessing the system is the external party notified if there are any new requests. Further, the system requires that the inmate choose to either leave a contact request or attempt a live call. These drawbacks severely limit the system's functionality making it both inefficient and difficult to implement into institutional settings.


In view of the foregoing, there clearly exists a need for a method and apparatus for increasing the efficiency of an institution's telephone call system. Furthermore, there clearly exists a need for a telecommunication system for use in penal or similar institutions that incorporates the ability to handle calls not answered by a human, whether the calls are unanswered or answered by a communication notification system. Also, the system should allow outside parties for web initiated contact requests with a specific inmate and/or be notified through an existing inmate telephone system if they have missed a call from a specific inmate. In addition, there exists a need for a system and method to electronically notify the outside party when the inmate has been notified of the outstanding call request.


BRIEF SUMMARY OF THE INVENTION

The invention embodies a multi-function communication notification system for use in controlled call management systems.


The invention provides third party customers (i.e., outside parties trying to get in touch with a specific inmate) with the ability to initiate contact requests for a given inmate through the Internet. The system allows for incoming web initiated call requests notifying the inmate of a missed call. Once the third party customer has signed up for the call request in the system, the customer may follow specific instruction to initiate call requests for an inmate. Additionally, the invention allows the inmate to check for his/her outstanding call requests or the system may automatically inform the inmate of contact requests when he/she makes an outgoing call through an Interactive Voice response system. The Interactive Voice Response system notifies the inmate through a call request notification canned message to the inmate via the inmate telephone. Further, the invention allows messages to be sent to the third party indicating that the inmate has been notified. The message may be sent via email, SMS (Short Message Service also known as text messaging), telephone, instant messenger, etc. The message may include information such as that the given inmate has been notified of the contact request.


Additionally, the invention allows a message to be sent to the third party if and when they have missed a call from the specific inmate. If the third party customer has signed up for email notifications through the system, then the system notifies the third party indicating that they have missed a call from a specific inmate. The message may be sent via email, SMS, telephone, instant messenger, etc.


In addition, the system provides the ability to control, monitor, record and report information relating to communication in an institutional based telecommunication network. The system may further implement a debit card platform or other such payment methods. The system of the invention may be implemented in a variety of facilities including penal institutions or similar facilities such as mental institutions, nursing homes, rehabilitation centers, correctional facilities, government agencies, private and public businesses and the like.


The invention is advantageous for both the institution and the inmates. It is not possible for an institution to charge for unanswered calls. The invention solves this problem and thus provides an additional revenue stream for the institution from the inmates and their contacts that use the system (i.e., reduces the institution's losses on unanswered calls). From the inmate's perspective, it becomes much easier to communicate with outside contacts by substantially improving the efficiency of institutional call management systems. The inmates and outside contacts can maintain contact when inmate-calling schedules conflict with outside contact schedules. Further, the invention enables inmates with call limits to be notified when a third party is trying to make contact. Advantageously, easier and more efficient communication has been found to foster less agitated behavior and help in an inmate's rehabilitation process.


Institutional-call management systems generally require acceptance from the called party before allowing the caller to communicate with the called party. However, in current call management_ systems, when an inmate places a call and a call is answered by an automated answering device or the call goes unanswered, the inmate cannot leave a message because, among other things, the automated answering device cannot enter the positive acceptance digit required by institutional call management systems (e.g., “If you would like to accept this call, press 1.”). Upon no answer or an answer by an automated answering device, the invention provides the recipient of the call from the inmate with a notification (via email, SMS, telephone, instant messenger, etc.) that a call has been missed. The recipient can select how they would like to be notified via an enrollment process. If the third party wishes to contact the inmate, they may initiate a contact request to notify the inmate.


Upon making contact with an automated answering device, the system will send a notification to the called party that they missed a call from the specific inmate. When the called party chooses to send a contact request for the specific inmate, the system prompts the called party to enter his or her pre-existing account information or set up a new account. Once the called party enters the proper account information or sets up an account, the called party sends a contact request after which the inmate is notified. The contact request may be web initiated, telephone initiated, SMS, instant messenger, etc. Also, an outside contact meeting the requirements set forth by the institution for communicating with an inmate can access the system at any time and send a contact request for that inmate.


Preferably, the appropriate account is charged on a per call request basis for usage of the system. However, several other methods for billing for usage of the system may be utilized, including, but not limited to, deducting the funds each time a contact request is initiated, charging a monthly service fee, deducting funds based on a per minute fee, or charging a monthly base fee plus a deducting funds on a per minute basis. Additionally, prepaid accounts are preferably created that allows for billing for system usage based on the aforementioned methods.


Therefore, it is an object of the invention to provide a more efficient call management system for use in penal institutions and the like.


It is yet another object of the invention to provide a method for allowing third parties to make web-initiated contact requests for a specific inmate.


Yet another object of the invention is to allow inmates to check their web-initiated contact requests.


It is yet another object of the invention to allow inmates to be automatically notified from the inmate phone of web-initiated contact requests.


It is yet another object of the invention to electronically notify the third parties when the inmate has been notified of the contact request.


Still yet another object of the invention is to provide security authentication for users of the system.


Another object of the invention is to enable third parties to be notified if a call from a specific inmate has been missed.


Further, it is another object of the invention to enable outside contacts to block calls or contact requests from an inmate.


It is yet another object of the invention to monitor and record communication between an inmate and outside contacts.


Still another object of the invention is to perform a security check on sent and received contact requests.


Yet another object of the invention is to provide a billing means for usage of the system.


It is further an object of the invention to enable outside parties to set up an account.


Finally, it is an object of the invention to enable the multi-mode communication notification system to be easily incorporated into inmate telecommunication systems.


In one non-limiting aspect of the invention, a method of institutional web-initiated contact request is provided comprising the steps of: providing a user secure web access to a call management system; enabling the user to create web-initiated contact requests; sending by the user a contact request through a web browser; receiving by the user an electronic notification when the contact request has been delivered.


In a second non-limiting aspect of the invention, a method for outbound email notifications in a controlled environment is provided, the method comprising the steps of: providing a first party secure access for message exchange; verifying the second party as indicative of an acceptable party; allowing the first party to place a telephone call to the second party; allowing the first party to select a prerecorded message for the second party; and notifying the second party electronically of the recorded message left by the first party.


In a third non-limiting aspect of the invention, a call management system is provided comprising: at least one network connection; at least one telephonic instrument; at least one routing means coupled to the telephonic instrument; and a control platform; wherein the control platform includes one or more apparatuses for the purposes of monitoring, recording, controlling, storing, and billing related to telephonic communication between a plurality of local and remote users; and wherein the control platform enables the local user to receive contact requests.


Other objects, features, and characteristics of the invention, as well as methods of operation and functions of the related elements of the structure, and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following detailed description with reference to the accompanying drawings, all of which form part of this specification.





BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the invention can be obtained by reference to a preferred embodiment set forth in the illustrations of the accompanying drawings. Although the illustrated embodiment is merely exemplary of systems for carrying out the invention, both the organization and method of operation of the invention, in general, together with further objectives and advantages thereof, may be more easily understood by reference to the drawings and the following description. The drawings are not intended to limit the scope of this invention, which is set forth with particularity in the claims as appended or as subsequently amended, but merely to clarify and exemplify the invention.


For a more complete understanding of the invention, reference is now made to the following diagrams in which:



FIG. 1 depicts a block drawing of the preferred embodiment of an inmate call management system according to the invention.



FIG. 2 is a flow chart depicting the preferred process implemented by the invention of a third party initiating a contact request for a specific inmate.



FIG. 3 is a flow chart depicting the preferred process whereby an inmate attempts to contact a third party.





DETAILED DESCRIPTION OF THE INVENTION

As required, a detailed illustrative embodiment of the invention is disclosed herein. However, techniques, systems and operating structures in accordance with the invention may be embodied in a wide variety of forms and modes, some of which may be quite different from those in the disclosed embodiment. Consequently, the specific structural and functional details disclosed herein are merely representative, yet in that regard, they are deemed to afford the best embodiment for purposes of disclosure and to provide a basis for the claims herein, which define the scope of the invention. The following presents a detailed description of the preferred embodiment (in addition to some alternative embodiments).


Referring to FIG. 1, depicted is a block diagram of an exemplary inmate call management system 100 and preferably, includes site platform 103 operably connected to an administrative workstation 105 via connection 107 and is also connected to a third-party computer system 113 via connection 115. Particularly, site platform 103 includes a site server that has software to provide third-party restricted access to site platform 103 in order to generate web-initiated contact requests as will be shown and described below. It should be appreciated that connections 107 and 115 are preferably LAN connections, however in other non-limiting embodiments, a wireless connection may also be utilized.


Also, site platform 103 is connected via connection 115 to a remote third-party user through third-party computer system 113. Site platform 103 allows a third party to create a call-request account on site platform 103 to create call requests via, in one non-limiting embodiment, the Internet through a web browser. The third party creates the call-request account by creating an account in an accounting system located in site platform 103, which authorizes the third party to send and receive web-initiated contact requests. Also, the accounting system, preferably, bills for usage as appropriate although monthly billing may also be provided to utilize this feature. The third-party account is associated with the third party's telephone number and provides a third party to notify an inmate of a call request.


A third party may access site platform 103 through a web browser located on third-party computing system 113 and create a call-request account (hereinafter “account”) associating the third-party telephone number with the account. This account authorizes the third party to send web-initiated contact requests as well as receive notification that a contact request has been received by the inmate (i.e., the inmate has listened to the contact request). Additionally, the third party may request, in one example, an email notification be sent to the third party if a call is not answered that has been initiated by the inmate. Other embodiments' may utilize an SMS notification, an Internet messenger notification, or other similar types of notification. Once the account has been set-up, a third party may access site platform 103 through web browser and create a call request by selecting from a list of canned messages, such as, for example, please call beck, do not call, etc. to send to the inmate. It should be appreciated by one of ordinary skill in the art that site platform 103 includes software to convert the canned message to an audio message to be subsequently played to the intended inmate when the inmate access call management system 100. Additionally, the site platform 103 notifies the third party when an inmate receives the canned message by sending, in one non-limiting example, an email to the third party although, an SMS text may also be sent to notify the third party indicating the inmate has been notified.


In addition, site platform 103 may incorporate firmware and software to route all inmate and call information through site platform 103 for efficient call transfer and efficient record keeping. It should also be appreciated that one of skill in the art will recognize that the call management system 100 is a multi-mode communication notification system utilized for notifying inmates of call requests as well as billing for inmate calls and may be incorporated into any call management system. Thus, FIG. 1 is merely an example of a call management system and is not intended to limit the scope of the invention.


In addition, depending on the memory requirements, site platform 103 may employ numerous site servers incorporating multiple processors. This allows call processing even after parallel component failure. The architecture also provides for a sharing of the load between processors, which eliminates system overload during extremely busy periods. The multiple processors enable the call processing system 100 to handle large volumes of calls at any time, and to ensure system integration. Also, site platform 103 stores digitized audio used for voice prompts in any commercially available database as well as each inmate user's call restrictions and other verification code required by the inmate user to access call management system 100.


Also as shown, administrative workstation 105 connects to site platform 103 via connection 107. Although only one administrative workstation 105 is shown, it is contemplated that multiple workstations 105 may be utilized by the system depending on institutional requirements. In addition, while administrative workstation 105 is shown onsite, it is also possible to access site platform 103 via the Internet through a web browser. Site platform 103 is controlled by software administered by administrative workstation 105. Administrative workstation 105 enables an administrator and authorized personnel to access account information, monitor calls, perform searches, etc. The workstation 105 may be used to listen to the outgoing telephone calls in real time or to access calls stored on a database or other type of storage means. It is also foreseeable that the functions controlled by site platform 103 may alternatively be controlled remotely at a central platform.


Also shown, site platform 103 connects to remote telephonic instruments 111a via connection 109. Connection 109 may be a Public Switched Telephone Network (PSTN), Voice over Internet Protocol (VoIP) connection, etc. depending on the requirements of the system. Further, one of skill in the art will recognize that the illustration of connection 109 is shown in a simplified form. Further, inmate call management system 100 includes a plurality of telephonic instruments 101a coupled to site platform 103, where “n” is an integer representative of the number of devices, site platform 103 is connected with, representing the desired capacity of call management system 100.


When an inmate wishes to check his outstanding call requests, he or she picks up telephonic instrument 101a. The site platform 103 prompts for identification information such as a Personal Identification Number (PIN) through an interactive Voice Response (IVR) system, although in other non-limiting embodiments, other identification means (not shown) may also be connected to telephonic instruments 101a such Radio Frequency Identification (RFID) technology and biometric identification means (i.e., fingerprint scanner, retinal scanner, voice analyzer, etc.). Once the platform 103 identifies the inmate, the inmate can check for any outstanding call requests. The system may also inform the inmate automatically if an external party has made a call request for the specific inmate. The IVR plays the call request notification (i.e., the audio version of the text-based canned message) and an email notification is send to the third party indicating that the inmate has been notified. In addition, site platform 103 preferably stores the call request session in a database.


When an inmate wishes to place a call, he or she picks up telephonic instrument 101a. The site platform 103 may, in one non-limiting example, prompt for identification information such as a Personal Identification Number (PIN) through an interactive Voice Response (IVR) system as was mentioned above. Once the platform 103 identifies the inmate, the inmate may make a call by dialing a telephone number that is associated with the third-party account that is stored in database on site platform 103. If the third party does not answer the call that has been initiated by the inmate, then the site platform 103 sends a canned message electronically to the third party (i.e., email notification) indicating they missed a call from a specific inmate.



FIG. 2 depicts a flow chart illustrating the preferred method of notifying an inmate through a web initiated call request according to the invention. The method starts in step 201 and proceeds to step 203 whereby an external party (i.e., third party) accesses site platform 103 to set up a contact call request account (also called “account”) that is associated with the external party telephone number. Next, in step 205, if an account exists for the telephone number, then the method proceeds to step 20.9 whereby the external party initiates a call request. The external party may access site platform 103 through a web browser and select the specific inmate to notify. The external party may select the specific canned message to send to the inmate, selecting from a list of predetermined choices. In this way, system 100 provides an inmate notification system that is easier to implement while giving the institution more control over call request message sent to the specific inmate.


However, if an account does not exist, then in step 207, the external party creates an account, in accounting system, by providing billing information associated with the third party telephone number that is to be associated with the account. The site platform 103 takes the external party through as many attempts to ensure that the account is successfully set up. In other non-limiting embodiments, accounting system may also require the external party to provide additional details verifying that the external party is a family member, etc. before creating the account. Further, by signing up for incoming web initiated contact requests, the accounting system bills the external party appropriate usage charges or may provide for a monthly billing rate. Next, in step 211, a canned message is created by site platform 103 by software, which converts the text message into a canned audio message. This audio message is stored in memory in site platform 103 to be played to the specific inmate when the inmate user next accesses system 100. Next, in step 213, the inmate user attempts to access system 100 and in step 215, system 100 prompts for user authentication through an interactive voice response system. In step 217, if the inmate user fails to be authenticated, then the system 100 denies entry. The attempt to access the system 100 is terminated in step 205 after the number of attempts to access the system 100 matches the maximum number of attempts allowed by the system 100. If the maximum number of attempts has not yet been reached, the site platform 103 again prompts the inmate user for authentication in step 215.


After the inmate user has successfully accessed the call management system 100, next in step 223, if there is a contact request available for the inmate, then the site platform 103, in step 225, plays the audio canned message to the inmate. However, if a contact request has not been created to listen by the inmate, then the system 100 ends access to system 100 in step 233.


Next, in step 223, the site platform 103 plays call request to inmate user and in step 227, call request session is stored in database by a software system, such as in one non-limiting example, an ITS system provided by site platform. Next, in step 229, the external party is then sent a notification via e-mail that the inmate has received the contact request, although in other embodiments, a notification may be sent by an SMS, an instant messenger notification, or other similar types of notification. The method ends in step 231 whereby the inmate terminates access to the call management system.



FIG. 3 depicts a flow chart illustrating the preferred method of notifying an external party through an inmate telephone call request. The method starts in step 301 and proceeds to step 303 whereby an inmate user (hereinafter “user”) attempts to call an external party by dialing the party's telephone number on one of a plurality of telephonic instruments 101a. In step 305, the site platform 103 prompts for user authentication. Authentication of the inmate is performed as is known in the art in step 307. For example, authentication may include the entering of a PIN number, using RFID technology, or utilizing biometric identification means. Such authentication may be used alone or in conjunction with any of other authentication.


Next, in step 309 system 100, through site platform 103, checks, to see whether the number of attempts to access the system 100 matches the maximum number of attempts allowed by system 100. Upon a match, the attempt to access the system 100 is terminated in step 311. If the user fails to be authenticated, then the system 100 denies entry and ends the call attempt in step 311. If the maximum number of attempts has not yet been reached, the system 100, again prompts the user for authentication as was shown in step 305.


Next, in step 313, after the inmate successfully logs in, the system 100 checks to see if there are any new contact requests from an external party and, if so, new contact requests are then played to the user. Next, in step 315, the external party who created the contact request, is sent a notification that the inmate has received the contact request via e-mail, although in other non-limiting examples, an SMS message, instant messenger message, or other similar types of notification maybe utilized. Next, in step 317, after all contact requests have been played, the inmate continues to place a call to an external party.


In step 319, verification tests are performed on the telephone number dialed such as verifying that the number dialed is an authorized number, that the number dialed has not been call forwarded, etc. If the attempted call fails the verification tests, the call attempt is ended in step 321. However, if the attempted call passes the verification tests, the call proceeds. The system attempts to make a connection—with the dialed party and detects whether the call is answered in step 323. Next, in step 329, if after a set number of rings the call remains unanswered or is answered by an answering machine, system 100, through site platform 103, determines whether the external party has signed up for outbound call notification. The call terminates in step 327 if the external party has not requested notification. However, in step 333, if the external party has requested notification that a call was missed from a specific inmate, then system 100 notifies the external party by email, although in other non-limiting examples, notification may be by SMS, instant messenger, etc. The call terminates in step 335. On the other hand, if the call is answered by a live person, then in step 325, the call proceeds with the inmate commencing a conversation with the external party. The method ends in step 327 when the conversation is voluntarily terminated by either party.


While the invention has been described with reference to the preferred embodiment and several alternative embodiments, which embodiments have been set forth in considerable detail for the purposes of making a complete disclosure of the invention, such embodiments are merely exemplary and are not intended to be limiting or represent an exhaustive enumeration of all aspects of the invention. The scope of the invention, therefore, shall be defined solely by the following claims. Further, it will be apparent to those skilled in the art that numerous changes may be made in such details without departing from the spirit and principles of the invention. It should be appreciated that the invention is capable of being embodied in other forms without departing from its essential characteristics.

Claims
  • 1. A call management system, comprising: one or more databases that store call restrictions associated with an inmate of a correction facility and recorded messages;a telephone instrument associated with the inmate; anda control platform configured to: receive a call from an external party directed to the inmate;determine that the inmate is unavailable;direct the external party to leave a voice message for the inmate;receive the voice message and a call notification flag from the external party, the call notification flag indicating whether the external party wishes to be separately notified of a missed call attempt from the inmate;store the voice message and the call notification flag in the one or more databases;perform security analysis on the voice message;in response to the voice message satisfying the security analysis, notifying the inmate via the telephone instrument as to the voice message and directing the inmate to retrieve the voice message from the one or more databases;transmitting a notification to the external party in response to the inmate retrieving the voice message from the one or more databases;receive an outgoing call from the inmate to the external party;detect that the outgoing call was not answered by the external party; andtransmit, in response to the detecting, a missed call notification to the external party based on the call notification flag.
  • 2. The call management system of claim 1, wherein the security analysis includes performing speech recognition on the voice message.
  • 3. The call management system of claim 1, wherein the one or more databases further store inmate schedules and availability.
  • 4. The call management system of claim 3, wherein the control platform determines that the inmate is unavailable based on the inmate schedules and availability.
  • 5. The call management system of claim 1, wherein the control platform notifies the inmate of the voice message via an SMS text message sent to the telephone instrument.
  • 6. The call management system of claim 1, wherein the control platform is further configured to: receive an inmate voice message from the inmate designated for the external party;analyze the inmate voice message for content;initiate the outgoing call to the external party in response to the inmate voice message passing the analysis of the content;verify an identity of the external party during the outgoing call; andplay back the inmate voice message for the external party in response to the verifying.
  • 7. A method for exchanging a message between an external party and an inmate, the method comprising: receiving a call from the external party directed to the inmate;determining that the inmate is unavailable;directing the external party to leave a voice message for the inmate;receiving the voice message and a call notification flag from the external party, the call notification flag indicating whether the external party wishes to be separately notified of a missed call attempt from the inmate;storing the voice message and the call notification flag in a database;performing security analysis on the voice message;in response to the voice message satisfying the security analysis, notifying the inmate via a telephone instrument as to the voice message and directing the inmate to retrieve the voice message from the database;transmitting a notification to the external party in response to the inmate retrieving the voice message from the database;receiving an outgoing call from the inmate to the external party;detecting that the outgoing call was not answered by the external party; andtransmitting, in response to the detecting, a missed call notification to the external party based on the call notification flag.
  • 8. The method of claim 7, wherein the security analysis includes performing speech recognition on the voice message.
  • 9. The method of claim 7, wherein the database stores schedule or availability data of the inmate.
  • 10. The method of claim 7, further comprising: receiving an inmate voice message from the inmate directed to the external party;analyzing the inmate voice message for content; anddelivering the inmate voice message to the external party.
  • 11. The method of claim 10, wherein the delivering includes: initiating the outgoing call to the external party;verifying an identity of the external party; andplaying back the inmate voice message for the external party.
  • 12. The method of claim 11, wherein the verifying includes receiving a personal identification number from the external party.
  • 13. The method of claim 11, wherein the verifying includes performing voice verification on the external party.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of U.S. application Ser. No. 15/420,458, filed Jan. 31, 2017, which is a divisional application of U.S. application Ser. No. 12/321,893 filed Jan. 27, 2009, now U.S. Pat. No. 9,621,714, both of which are incorporated herein by reference in their entireties.

US Referenced Citations (296)
Number Name Date Kind
4054756 Comella et al. Oct 1977 A
4191860 Weber Mar 1980 A
4652700 Matthews et al. Mar 1987 A
4766604 Axberg Aug 1988 A
4916726 Morley, Jr. Apr 1990 A
4935956 Hellwarth et al. Jun 1990 A
5068888 Scherk et al. Nov 1991 A
5319702 Kitchin et al. Jun 1994 A
5351287 Bhattacharyya et al. Sep 1994 A
5535261 Brown et al. Jul 1996 A
5539812 Kitchin et al. Jul 1996 A
5553145 Micali Sep 1996 A
5648916 Manduley Jul 1997 A
5655013 Gainsboro Aug 1997 A
5705995 Lafflin et al. Jan 1998 A
5740231 Cohn et al. Apr 1998 A
5745558 Richardson, Jr. et al. Apr 1998 A
5768355 Salibrici et al. Jun 1998 A
5778313 Fougnies Jul 1998 A
5805810 Maxwell Sep 1998 A
5826034 Albal Oct 1998 A
5838790 McAuliffe et al. Nov 1998 A
5848397 Marsh et al. Dec 1998 A
5854975 Fougnies et al. Dec 1998 A
5872926 Levac et al. Feb 1999 A
5894558 Falker Apr 1999 A
5937037 Kamel et al. Aug 1999 A
5956717 Kraay et al. Sep 1999 A
5958005 Thorne et al. Sep 1999 A
5982506 Kara Nov 1999 A
5987611 Freund Nov 1999 A
6002689 Christie Dec 1999 A
6035327 Buckley et al. Mar 2000 A
6052454 Kek et al. Apr 2000 A
6061718 Nelson May 2000 A
6064963 Gainsboro May 2000 A
6067514 Chen May 2000 A
6092192 Kanevsky et al. Jul 2000 A
6097791 Ladd et al. Aug 2000 A
6137864 Yaker Oct 2000 A
6145004 Walsh Nov 2000 A
6151679 Friedman et al. Nov 2000 A
6161139 Win et al. Dec 2000 A
6173259 Bijl et al. Jan 2001 B1
6173284 Brown Jan 2001 B1
6192114 Council Feb 2001 B1
6226362 Gerszberg et al. May 2001 B1
6226363 Miller May 2001 B1
6233313 Farris et al. May 2001 B1
6233318 Picard et al. May 2001 B1
6246871 Ala-Laurila Jun 2001 B1
6249808 Seshadri Jun 2001 B1
6285777 Kanevsky et al. Sep 2001 B2
6304636 Goldberg et al. Oct 2001 B1
6356867 Gabai et al. Mar 2002 B1
6363414 Nicholls et al. Mar 2002 B1
6366651 Griffith et al. Apr 2002 B1
6389276 Brilla et al. May 2002 B1
6400272 Holtzman et al. Jun 2002 B1
6411685 O'Neal Jun 2002 B1
6477492 Connor Nov 2002 B1
6490611 Shen et al. Dec 2002 B1
6493447 Goss et al. Dec 2002 B1
6526335 Treyz et al. Feb 2003 B1
6560323 Gainsboro May 2003 B2
6570970 Gruchala et al. May 2003 B2
6591367 Kobata et al. Jul 2003 B1
6603838 Brown et al. Aug 2003 B1
6606648 Mukundan et al. Aug 2003 B1
6611583 Gainsboro Aug 2003 B1
6639977 Swope et al. Oct 2003 B1
6665378 Spielman et al. Dec 2003 B1
6665380 Cree et al. Dec 2003 B1
6668045 Mow Dec 2003 B1
6681114 Chang et al. Jan 2004 B2
6684248 Janacek et al. Jan 2004 B1
6714982 McDonough et al. Mar 2004 B1
6775359 Ron et al. Aug 2004 B1
6788771 Manto Sep 2004 B2
6801932 Picoult et al. Oct 2004 B1
6819932 Allison et al. Nov 2004 B2
6850147 Prokoski et al. Feb 2005 B2
6857024 Chen et al. Feb 2005 B1
6865260 Meadows et al. Mar 2005 B1
6879677 Trandal et al. Apr 2005 B2
6950502 Jenkins Sep 2005 B1
7003308 Fuoss et al. Feb 2006 B1
7013002 Link et al. Mar 2006 B2
7039071 Pekonen May 2006 B2
7039171 Gickler May 2006 B2
7039949 Cartmell et al. May 2006 B2
7046779 Hesse May 2006 B2
7058163 Parekh et al. Jun 2006 B1
7079636 McNitt et al. Jul 2006 B1
7085359 Crites et al. Aug 2006 B2
7095829 Claudatos et al. Aug 2006 B2
7106843 Gainsboro Sep 2006 B1
7136462 Pelaez et al. Nov 2006 B2
7158621 Bayne Jan 2007 B2
7197560 Caslin et al. Mar 2007 B2
7248680 Gainsboro Jul 2007 B1
7256816 Profanchik et al. Aug 2007 B2
7260383 Ngan Aug 2007 B1
7265853 Kara et al. Sep 2007 B1
7277695 Petry et al. Oct 2007 B2
7278028 Hingoranee Oct 2007 B1
7333798 Hodge Feb 2008 B2
7359494 Leonard Apr 2008 B2
7363302 Lester Apr 2008 B2
7496345 Rae et al. Feb 2009 B1
7505406 Spadaro et al. Mar 2009 B1
7519076 Janssen et al. Apr 2009 B2
7551732 Anders Jun 2009 B2
7561679 Kalbag Jul 2009 B1
7561680 Falcone et al. Jul 2009 B1
7565687 Noguchi et al. Jul 2009 B2
7583974 Benco et al. Sep 2009 B2
7590693 Chan Sep 2009 B1
7651680 Breton et al. Jan 2010 B2
7664689 Rosenfield et al. Feb 2010 B1
7673058 White et al. Mar 2010 B1
7681032 Peled et al. Mar 2010 B2
7742581 Hodge et al. Jun 2010 B2
7742582 Harper Jun 2010 B2
7783021 Hodge Aug 2010 B2
7804941 Keiser et al. Sep 2010 B2
7881446 Apple et al. Feb 2011 B1
7899167 Rae Mar 2011 B1
8000269 Rae et al. Aug 2011 B1
8014800 Törnkvist Sep 2011 B2
8130919 Kalbag Mar 2012 B2
8190121 Smith et al. May 2012 B2
8204177 Harper Jun 2012 B2
8218736 McClintock et al. Jul 2012 B1
8232862 Lowe Jul 2012 B2
8238534 Link et al. Aug 2012 B2
8243891 Hodge et al. Aug 2012 B2
8255300 Polozola et al. Aug 2012 B2
8458732 Hanna et al. Jun 2013 B2
8488756 Hodge et al. Jul 2013 B2
8509390 Harper Aug 2013 B2
8515031 Hodge et al. Aug 2013 B2
8577003 Rae Nov 2013 B2
8626118 Smith et al. Jan 2014 B2
8725115 Liu et al. May 2014 B2
8838622 Irving et al. Sep 2014 B2
9043813 Hanna et al. May 2015 B2
9077680 Harper Jul 2015 B2
9282188 Hodge et al. Mar 2016 B2
9306883 Hodge et al. Apr 2016 B2
9621714 Seyfetdinov Apr 2017 B2
9667663 Hodge et al. May 2017 B2
9680878 Hodge et al. Jun 2017 B2
9680879 Hodge et al. Jun 2017 B2
9692718 Bennett Jun 2017 B2
9757032 Gross et al. Sep 2017 B2
9787724 Hodge et al. Oct 2017 B2
9807123 Hodge et al. Oct 2017 B2
9871915 Hodge et al. Jan 2018 B2
9876915 Hodge et al. Jan 2018 B2
9923932 Hodge et al. Mar 2018 B2
9967291 Hodge et al. May 2018 B1
10116707 Hodge et al. Oct 2018 B2
10218842 Hodge et al. Feb 2019 B2
10397410 Hodge et al. Aug 2019 B2
10560488 Hodge et al. Feb 2020 B2
10749827 Hodge Aug 2020 B2
10757265 Seyfetdinov Aug 2020 B2
20010036821 Gainsboro et al. Nov 2001 A1
20010044297 Myer Nov 2001 A1
20020007453 Nemovicher Jan 2002 A1
20020054674 Chang et al. May 2002 A1
20020071537 Gainsboro Jun 2002 A1
20020111887 McFarlane et al. Aug 2002 A1
20020159600 Weiner Oct 2002 A1
20020183040 Lundstrom et al. Dec 2002 A1
20030002639 Huie Jan 2003 A1
20030009333 Sharma et al. Jan 2003 A1
20030070076 Michael Apr 2003 A1
20030083041 Kumar et al. May 2003 A1
20030086546 Falcone et al. May 2003 A1
20030099337 Lord May 2003 A1
20030126470 Crites et al. Jul 2003 A1
20030187939 O'Brien Oct 2003 A1
20030198325 Bayne Oct 2003 A1
20030200078 Luo et al. Oct 2003 A1
20030216983 Bodin Nov 2003 A1
20040029564 Hodge Feb 2004 A1
20040058667 Pienmaki et al. Mar 2004 A1
20040076272 Zafar et al. Apr 2004 A1
20040081296 Brown et al. Apr 2004 A1
20040114740 Gickler Jun 2004 A1
20040120475 Bauer et al. Jun 2004 A1
20040196963 Appelman et al. Oct 2004 A1
20040202327 Little et al. Oct 2004 A1
20040235520 Cadiz et al. Nov 2004 A1
20040236838 Tout Nov 2004 A1
20040252447 Hesse et al. Dec 2004 A1
20050010573 Garg Jan 2005 A1
20050053221 Reding Mar 2005 A1
20050055411 Bouchard Mar 2005 A1
20050078612 Lang Apr 2005 A1
20050080868 Malik Apr 2005 A1
20050094794 Creamer et al. May 2005 A1
20050114192 Tor et al. May 2005 A1
20050123111 Philbin Jun 2005 A1
20050125226 Magee Jun 2005 A1
20050207341 Zhang Sep 2005 A1
20050265322 Hester Dec 2005 A1
20050286498 Rand et al. Dec 2005 A1
20050287993 Gogic Dec 2005 A1
20060062355 Leonard Mar 2006 A1
20060087554 Boyd et al. Apr 2006 A1
20060098796 Link May 2006 A1
20060149644 Sulmar et al. Jul 2006 A1
20060168015 Fowler Jul 2006 A1
20060182232 Kerr Aug 2006 A1
20060227763 Croak Oct 2006 A1
20060245552 Hayashi Nov 2006 A1
20060245559 Hodge Nov 2006 A1
20060245579 Bienfait et al. Nov 2006 A1
20060256940 Pekarovic Nov 2006 A1
20070041545 Gainsboro Feb 2007 A1
20070044734 Maloney et al. Mar 2007 A1
20070133757 Girouard Jun 2007 A1
20070155411 Morrison Jul 2007 A1
20070165790 Taori et al. Jul 2007 A1
20070195751 Cai et al. Aug 2007 A1
20070207785 Chatterjee et al. Sep 2007 A1
20070233610 Gyllenskog et al. Oct 2007 A1
20070239898 Friend et al. Oct 2007 A1
20070263853 Pearson et al. Nov 2007 A1
20070283006 Hong Dec 2007 A1
20080037722 Klassen Feb 2008 A1
20080039053 Polozola Feb 2008 A1
20080051067 Kwon Feb 2008 A1
20080126951 Sood et al. May 2008 A1
20080198980 Skakkebaek Aug 2008 A1
20080200152 Moore Aug 2008 A1
20080219414 Ramamoorthy et al. Sep 2008 A1
20080249778 Barton et al. Oct 2008 A1
20080260118 Lyle Oct 2008 A1
20090054031 Smith et al. Feb 2009 A1
20090076832 Collins Mar 2009 A1
20090086631 Jayapalan et al. Apr 2009 A1
20090086936 Clifford et al. Apr 2009 A1
20090147937 Sullhan Jun 2009 A1
20090197622 Atarius Aug 2009 A1
20090201886 Lee et al. Aug 2009 A1
20090203361 Huang et al. Aug 2009 A1
20090274279 Reynolds Nov 2009 A1
20100023472 Loeb Jan 2010 A1
20100054433 Gustave et al. Mar 2010 A1
20100056110 Liu et al. Mar 2010 A1
20100138357 Mufti-Bey Jun 2010 A1
20100153114 Shih et al. Jun 2010 A1
20100189228 Seyfetdinov Jul 2010 A1
20100241663 Huang et al. Sep 2010 A1
20100254263 Chen et al. Oct 2010 A1
20100299761 Shapiro Nov 2010 A1
20100318441 Harper Dec 2010 A1
20110106894 Hodge et al. May 2011 A1
20110286585 Hodge Nov 2011 A1
20110286591 Fulton et al. Nov 2011 A1
20120094680 Stackelius et al. Apr 2012 A1
20120202454 Smith et al. Aug 2012 A1
20130058274 Scherzer et al. Mar 2013 A1
20130162423 Rowe et al. Jun 2013 A1
20130179949 Shapiro Jul 2013 A1
20130246535 Yadava et al. Sep 2013 A1
20140020063 Hodge et al. Jan 2014 A1
20140044242 Hodge Feb 2014 A1
20140280631 Torgersrud Sep 2014 A1
20150043721 Hodge et al. Feb 2015 A1
20150046978 Hodge et al. Feb 2015 A1
20150047004 Hodge et al. Feb 2015 A1
20150066523 Pan Mar 2015 A1
20150103990 Lee Apr 2015 A1
20150181489 Chong et al. Jun 2015 A1
20150201080 Hodge et al. Jul 2015 A1
20150201081 Hodge et al. Jul 2015 A1
20150215254 Bennett Jul 2015 A1
20150223705 Sadhu Aug 2015 A1
20160142537 Hodge et al. May 2016 A1
20160156625 Hodge et al. Jun 2016 A1
20160381082 Hodge et al. Dec 2016 A1
20170127257 Saxena et al. May 2017 A1
20170142258 Seyfetdinov May 2017 A1
20170279857 Hodge et al. Sep 2017 A1
20170302756 Chou et al. Oct 2017 A1
20170324834 Hodge Nov 2017 A1
20180213090 Hodge et al. Jul 2018 A1
20180331987 Hodge Nov 2018 A1
20190132364 Hodge et al. May 2019 A1
20200252438 Hodge et al. Aug 2020 A1
20210021554 Hodge Jan 2021 A1
Foreign Referenced Citations (4)
Number Date Country
0989720 Mar 2000 EP
2400284 Oct 2004 GB
WO 9921330 Apr 1999 WO
WO 9948054 Sep 1999 WO
Non-Patent Literature Citations (60)
Entry
Examination Report directed to related Australian Patent Application No. 2017260202, dated Mar. 16, 2021; 7 pages.
“Cisco IAD2400 Series Business-Class Integrated Access Device”, Cisco Systems Datasheet, 2003.
“SIP and IPLinkTM in the Next Generation Network: An Overview,” Intel, 2001.
“Voice Over Packet in Next Generation Networks: An Architectural Framework,” Bellcore, Special Report SR-4717, Issue 1, Jan. 1999.
“Criminal Calls: A Review of the Bureau of Prisons' Management of Inmate Telephone Privileges,” U.S. Department of Justice, Office of the Inspector General, Aug. 1999.
“Why Can't You Make a Collect Call to a Cell Phone,” National Public Radio, Jun. 30, 2008, Accessed via http://www.npr.org/templates/story/story.php?storyId=92021561 on Apr. 6, 2015.
1800MumDad.com.au—Explanation, Aug. 29, 2007—Retrieved from the Internet Archive Wayback Machine at https://web.archive.org/web/20070829114354/http://1800mumdad.com.au/main.php?type=charges2; 2 pages.
1800MumDad.com.au—Summary Standard Form of Agreement, Apr. 26, 2006—Retrieved from the Internet Archive Wayback Machine at https://web.archive.org/web/20060426180115/http://www.1800mumdad.com.au/main.php?type=summarysfoa; 3 pages.
Ahimovic et al., “Services for Tomorrow's PCS,” IEEE International Conference on Universal Personal Communications, vol. 1, Oct. 12-15, 1993; pp. 222-227.
Brown, et al., “SMS: The Short Message Service,” Computer, vol. 40, No. 12, 2007.
BubbleLINK® Software Architecture (Science Dynamics 2003).
Bur Goode, Voice Over Internet Protocol (VoIP), Proceedings of the IEEE, vol. 90, No. 9, 1495-1517 (Sep. 2002).
Clifford J. Weinstein, MIT, The Experimental Integrated Switched Network—A System-Level Network Test Facility (IEEE 1983).
Commander Call Control System, ReV. 1.04 (Science Dynamics 2002).
Confalone et al., “Calling Card Service—TSPS Hardware, Software, and Signaling Implementation,” The Bell System Technical Journal, Sep. 1982, vol. 61, No. 7; pp. 1675-1714.
Digital Copy of “Bellcore Notes on the Networks,” Bellcore, Special Report SR-227 5, Issue 3, Dec. 1997.
Excerpts from the Prosecution History of U.S. Appl. No. 10/135,878, filed Apr. 29, 2002.
Reexamination U.S. Appl. No. 90/012,802 of US. Patent No. 8,190,121, filed March 1, 2013.
Garner, et al., “Mobile Terminated SMS Billing—Exploits and Security Analysis,” IEEE International Conference on Information Technology: New Generations, 2006.
Jeff Hewett and Lee Dryburgh, Signaling System No. 7 (SS7/C7): Protocol, Architecture, and SerVices (Networking Technology) at 85 (Cisco Press, June 2005).
McKitterick et al., “State of the Art ReView of Mobile Payment Technology,” Department of Computer Science, Trinity College Dublin; 22 pages.
Operator Service System Generic Requirements, OSSGR, TR-TSY-000271, Collect Billing, Rev. 3, Mar. 1988, 50 pages.
Osifchin, N., “A Telecommunications Buildings/Power Infrastructure in a New Era of Public Networking,” IEEE 2000.
PacketCableTM 1.0 Architecture Framework Technical Report, PKT-TR-ARCH-V0 1-001201 (Cable Television Laboratories, Inc. 1999).
Pages from http://www.corp.att.com/history, archived by web.archive.org on Nov. 4, 2013.
Photocopy of “Bellcore Notes on the Networks (Formerly BOC Notes on the LEC Networks),” Bellcore, Special Report SR-2275, Issue 3, Dec. 1997.
Prosecution History of U.S. Appl. No. 11/045,589, filed Jan. 28, 2005.
Rey, R.F., ed., “Engineering and Operations in the Bell System,” 2nd Edition, AT&T Bell Laboratories: Murray Hill, NJ, 1983.
Schwartz, et al., “How to Build an SMS Service,” O'Reilly Short Cuts, 2007.
Science Dynamics, Inmate Telephone Control Systems, http://scidyn.com/fraudprev_main.htm (archived by web.archive.org on Jan. 12, 2001).
Science Dynamics, SciDyn BubbleLINK, http://www.scidyn.com/products/bubble.html (archived by web.archive.org on Jun. 18, 2006).
Science Dynamics, SciDyn Call Control Solutions: Commander II, http://www.scidyn.com/products/commander2.htrnl (archived by web.archive.org on Jun. 18, 2006).
Science Dynamics, SciDyn IP Gateways, http://scidyn.com/products/ipgateways.html (archived by web.archive.org on Aug. 15, 2001).
Science Dynamics, Science Dynamics—IP Telephony, http://www.scidyn.com/iptelephony_maim.htm (archived by web.archive.org on Oct. 12, 2000).
Sundstrom, K., “Voice over IP: An Engineering Analysis,” Master's Thesis, Department of Electrical and Computer Engineering, University of Manitoba, Sep. 1999.
The Line Information Database (LIDB) and Wireless Services, Telcordia Technologies White Paper, Dec. 2001, 31 pages.
U.S. Appl. No. 60/607,447, “IP-based telephony system and method,” to Apple, et al., filed Sep. 3, 2004.
U.S. Appl. No. 60/935,634, “Method of Enabling an SMS Text Message to Facilitate Payment on a Cellular Bill for a Billable Call Received on a Cell Phone,” to Martin, et al., filed Aug. 23, 2007.
Valcourt, et al., “Investigating mobile payment: Supporting technologies, methods, and use,” IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications, 2005.
Wireless Interconnection and Reciprocal Compensation Agreement Between Community Telephone Company and United States Cellular Corporation, Apr. 24, 2006, 29 pages.
Advanced Technologies Group, Inc, White Paper: Introduction to Advanced Technologies Group, Inc., Inmate Correspondence System, Aug. 5, 2002, American Corrections Association Annual Conference, Anaheim, California.
Advanced Technologies Group, Inc., Correspondence System Poster, published Jul. 29, 2002 by Exhibit-Resources Midwest, displayed at Aug. 2002 American Corrections Association Annual Conference, Anaheim, California.
Advanced Technologies Group, Inc., Offender Management Suite: Correspondence System Brochure, printing invoice dated Aug. 2, 2002, brochure distributed at Aug. 2002 American Corrections Association Annual Conference, Anaheim, California.
Avtalion, J., “Keeping tabs on call centres,” Telecommunications, vol. 31, No. 7, Jul. 1997, pp. 70-72.
Creps, et al., “Is somebody watching? Employee communications and privacy,” Risk Management vol. 44, No. 4, Apr. 1997, pp. 22-28.
English-language Abstract for European Patent Publication No. 0989720 A1; 2 pages.
Excerpts from U.S. Appl. No. 60/538,933 to Shapiro, filed Jan. 22, 2004, 7 pages.
Henry, M., “Unethical staff behavior,” Corrections Today, vol. 60, No. 3, Jun. 1, 1998.
International Search Report and Written Opinion directed to International Patent Application No. PCT/US2016/018653, dated May 30, 2016; 11 pages.
International Search Report and Written Opinion directed to International Patent Application No. PCT/US2017/031321, dated Jul. 14, 2017; 13 pages.
Maghan, J ., “Intelligence Gathering Approaches in Prisons,” Low Intensity Confict & Law Enforcement, vol. 3. No. 3, 1994, pp. 548-557.
Procops, T., “Advanced call logging for public safety organizations,” Public Management, vol. 82, vol. 3, Mar. 2000, pp. 17-19.
Shearer, G., “How logging and monitoring technologies improve quality in a call center,” Telemarketing & Call Center Solutions, vol. 16, No. 7, Jan. 1998, pp. 92-101.
Smith, M., “Corrections Turns Over a New LEAF: Correctional Agencies Receive Assistance From the Law Enforcement Analysis Facility,” Corrections Today, Oct. 1, 2001 .
U.S. Appl. No. 15/288,520, “Electronic Messaging Device,”to Hodge et al., filed Oct. 7, 2016.
U.S. Appl. No. 60/036,689, filed Jan. 31, 1997, titled Database Origami.
U.S. Appl. No. 60/246,070, “Employee Online Activity Monitoring System,” to Mcfarlane, et al., filed Nov. 7, 2000.
U.S. Appl. No. 60/500,725, “SMS Message Processing,” to Claudatos, filed Sep. 4, 2003.
Web pages from “Electronic Message Solutions Inc. (EMS): Improving Relationships through faster Correspondence,” 2004, 9 pages; retrieved from http://www.inmatemail.com.
Wenndt, et al., “Content recognition for telephone monitoring,” Proceedings of the SPIE—The International Society for Optical Engineering, vol. 4232, 2001, pp. 274-80.
Related Publications (1)
Number Date Country
20210021708 A1 Jan 2021 US
Divisions (1)
Number Date Country
Parent 12321893 Jan 2009 US
Child 15420458 US
Continuations (1)
Number Date Country
Parent 15420458 Jan 2017 US
Child 16987209 US