System and method for inmate notification and training in a controlled environment facility

Information

  • Patent Grant
  • 12250187
  • Patent Number
    12,250,187
  • Date Filed
    Thursday, November 17, 2022
    2 years ago
  • Date Issued
    Tuesday, March 11, 2025
    2 months ago
Abstract
A messaging system for relaying messages to groups of inmates located in one or more controlled-environment facilities. The system receives a message from a user and a recipient designation identifying those inmates designated for receiving the message. The system performs a content check of the message or requests administrator authorization of the message, and then packages the message in a format designated by the facility. The packaged message includes the message itself, and also recipient information and other delivery information. The message may be packaged uniquely according to facility specifications. At the facility, the received message is unpacked. Recipients are identified from the recipient designation in the message, and delivery methods are retrieved for each of the intended recipients. Delivery of the message is then carried out, at a time designated in the message, according to the retrieved delivery methods.
Description
BACKGROUND
Field

This disclosure relates to disseminating information, such as notifications and announcements to inmates of a controlled environment facility.


Background

Inmates of prisons or other controlled environment facilities live under very controlled conditions, and their access to information from both inside and outside the prison is often limited. However, many situations arise in which prison officials desire to disseminate certain information to the inmates. As of currently, that information is passed along in rather inconvenient and inaccurate ways, such as word of mouth or PA announcements.





BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate embodiments of the present disclosure and, together with the description, further serve to explain the principles of the disclosure and to enable a person skilled in the pertinent art to make and use the embodiments.



FIG. 1 illustrates a block diagram of an exemplary controlled environment communication system, according to embodiments of the present disclosure.



FIG. 2 illustrates a block diagram of an exemplary messaging center of the exemplary controlled environment communication system of FIG. 1, according to embodiments of the present disclosure.



FIG. 3 illustrates a block diagram of an exemplary site server for use in the exemplary controlled environment communication system of FIG. 1, according to embodiments of the present disclosure.



FIG. 4 illustrates an exemplary data table for use with the exemplary messaging center of FIG. 2, according to embodiments of the present disclosure.



FIG. 5 illustrates a flowchart diagram of an exemplary method for disseminating a notification to one or more inmates of a controlled environment facility.



FIG. 6 illustrates a block diagram of computer system.





The present disclosure will be described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.


DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.


The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the disclosure. Rather, the scope of the disclosure is defined only in accordance with the following claims and their equivalents.


Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.


For purposes of this discussion, any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.


The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the disclosure that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or customize for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.


As discussed above, there are currently insufficient means of disseminating information to inmates within controlled facilities. This is partially due to the traditional communications limitations within prison facilities. Because of substantial security concerns, inmates of such facilities were traditionally limited to placing calls at highly-monitored central telephone banks in the facility, and their access to the Internet was completely prohibited. However, recent technological advancements have allowed for inmates of secure facilities to be assigned wireless communication devices, such as that described in U.S. Pat. No. 13,946,637, entitled Multifunction Wireless Device, the entirety of which is incorporated herein by reference.


With the advent of these new communication capabilities, controlled environment facilities have significant new communications lines available between administrators and the inmates. Thus, it is conceived that those devices be used as a means for facilitating better and more direct communication with inmates for purposes of information dissemination. Systems and methods for carrying out these objections will be described herein for carrying out those objectives.


Exemplary Communication System



FIG. 1 illustrates a block diagram of an exemplary controlled environment communication system 100, according to embodiments of the present disclosure. The communication system includes a central communication server 150 connected to a plurality of different controlled environment facilities 101. The central communication server 150 performs the call and other communications data processing for the different facilities, including routing and monitoring calls, Internet activity, and video calling, etc. In an embodiment, the central communication server 150 is centrally located from the multiple controlled environment facilities. In another embodiment, the central communication server 150 is located on site at one of the controlled environment facilities 101. The central communication server 150 also includes a messaging center 155 for processing incoming and outgoing messages or other notifications to the inmate population.


In an embodiment, an exemplary controlled environment facility includes a site server 140 that handles internal call processing and routing. In an alternative embodiment, the site server 140 is located remotely from the facility, such as within the central communication server 150. Such processing primarily includes routing call data from the central communication server 150 to its respective destination telephone device. A telephone bank 130 and a router 120 are in communication with the site server 140 for receiving call data from the site server 140. The telephone bank 130 serves a plurality of hardwired telephones 102. These phones may be VoIP, POTS, or other telephone devices capable of communication with the site server 140 over a telephone or data communication line. Meanwhile, the router 120 includes one or more antenna 125 for wirelessly communicating with one or more wireless communication devices 104 assigned to the different inmates and/or prison personnel associated with the facility. An on-site administrative terminal 145 is also connected to the site server to allow for an authorized individual to send a notification or other message, and/or access the central communication server 150.


Multiple other controlled environment facilities 101 are connected to the central communication server 150. Those facilities 101 may have the same or similar configurations to the exemplary controlled environment facility 101A. Also connected with the central communication server 150 is an administrative terminal 170, a database 157, and a network 160. In an embodiment, the administrative terminal 170 is an on-site computer terminal, accessible by an authorized administrator, and with control capabilities of the central communication server 150. In an embodiment, the database 157 is a separate database located remotely from the central communication server 150, and stores numerous different types of call and administrative data relating to one or more of the controlled environment facilities 101. In an embodiment, the network 160 is a public network for communicating across telephone or other communication lines to outside parties, such as the public switched telephone network (PSTN).


In operation, a pre-registered individual attempts to access the messaging center 155 via either the on-site administrative terminal 145 or the administrative terminal 170. If the individual has not yet been registered, the individual must undergo a registration process to register certain identifying information of the individual along with authentication information, such as a PIN or biometric sample associated with the individual. The registration information is stored in the database 157 along with messaging permissions. At some point before the individual submits a message, the individual is prompted to identify themselves, after which an authentication of the individual occurs. The individual may identify themselves using a PIN or a biometric submission, such as a fingerprint, voice sample, facial scan, etc. The administrative terminal 145/170 forwards the received information to the central communication server 150 for authentication.


The central communication server 150 uses the received identifying information to locate a user record in the database with matching identifying information. Once retrieved, biometric authentication is performed by performing a statistical comparison of the received biometric identification to the previously-stored biometric information. Based on the comparison, the central communication server 150 authenticates the individual. After the user has been authenticated, the central communication server 150 returns a notification to the corresponding terminal that the individual has been authenticated along with the individual's messaging permissions based on the retrieved user record. Summarily, the messaging permissions identify whether the individual is permitted to submit messages with or without approval, and for which inmates.


After the user has been authenticated, the user submits a message via an interface associated with the corresponding administrative terminal 145/170 along with an identification of recipient inmates. In an embodiment, the recipient inmates are identified as a group, such as by location or status. The terminal 145/170 transmits the message and recipient information to the central communication server 150, where it is received by the messaging center 155. The messaging center 155 processes the received recipient information and transmits the received message over the various communication lines to the identified recipients. Further details regarding the message processing and transmission is described below.


Exemplary Messaging Center



FIG. 2 illustrates a block diagram of an exemplary messaging center 200 of the exemplary controlled environment communication system 100 of FIG. 1, according to embodiments of the present disclosure. The messaging center 200 includes message input 210, message packaging 220, message transmitter 230, and message authorization 240, and may represent an exemplary embodiment of the messaging center 150, illustrated in FIG. 1.


In an embodiment, the messaging center 200 receives the message from the user at message input 210. As discussed above, the message is received from the user via one of the administrative terminals 145/170, through the central communication system 150. In another embodiment, the user sends the message information from a separate device, such as a personal wireless device or personal computer workstation. At the message input 210 of the messaging center 200, the message is received with all necessary information for proper delivery, including the message itself as well as intended recipient information, such as inmate group, facility, district, etc.


The message input 210 forwards the received information to the message packaging 220. Message packaging 220 reviews the destination information received with the message and accesses a database to review transmission protocols for the intended destination. For example, many facilities may have specific transfer protocols, message formats, etc. These protocols are stored in the message packaging 220, or in database 157 accessed by the message packaging 220. After the message protocols are retrieved by the message packaging 220, message packaging formats the relevant information into the appropriate format dictated by the retrieved format information for transmission. To provide an example, a particular facility may provide a certain number of leading bits in the message for the inmate designation, and may also designate how different inmate groups are to be referenced within the encoded message. Based on the this information, message packing assigns the relevant inmate group code based on the destination information within the message, and then organizes the destination information and the message information into the final encoded message for transmission.


In an embodiment, message packaging 220 also utilizes the user information received in the received message to determine permissions. In other words, using the user information associated with the received message, message packaging 220 checks the database 157 to determine the permission level associated with the user. Certain users are granted different messaging permissions. In an embodiment, there are three levels of permissions, including full, limited, and none. Full permissions allow for messages to be transmitted without review or authorization, limited permissions allow for messages to be transmitted after authorization from a registered user with full permissions to the destination, and those with no permissions are prohibited from sending messages to the destination. For example, the warden of a particular facility is granted full permissions for that facility, but limited permissions for all other facilities within the district, and no permissions for other facilities in the state. Meanwhile, an administrator with the state department of corrections may be provided full permissions for all facilities in the state. In embodiments, the permissions are broken down by inmate groups within facilities, or even individual inmates within facilities.


If the message packaging 220 determines from the user information and the permissions data retrieved from the database that the user has no permissions to the destination information included in the received message information, the message packaging denies transmission of the message. If the message packaging 220 determines that the user has full permissions, the message packaging 220 packages the message for transmission to the destination. If the message packaging 220 determines that the user has limited permissions, message packaging controls message authorization 240 to contact a pre-designated authorized person to authorize the message. The message authorization 240 returns a “authorized” or “not authorized”. If the message authorization 240 returns “authorized”, the message packaging 220 proceeds to package and forward the message for transmission. On the other hand, if the message authorization 240 returns “not authorized,” message packaging declines to send the message.


The message transmitter 230 receives the packaged message from message packaging 220, and then transmits the packaged message to the relevant facility designated in the message. In an embodiment, the facility is designated in the packaged message by an IP address or other network address.


Site Server



FIG. 3 illustrates an exemplary site server 300 according to an embodiment. The site server 300 includes a message receiver 310, message parsing 320, and notification 330, and may represent an exemplary embodiment of the site server 140 of FIG. 1.


As discussed above, each facility may have its own message formatting requirements. Regardless, there is more information than simply the message, which is received by the site server 300. Namely, the received message includes the message, as well as recipient information, message sender, etc. Additional examples of information that can be included in a received message package is delivery time, permissions, etc. All this information is packaged together into the format designated by the facility, and transmitted to the facility by the central communication server 140.


The packaged message is received at the site server 300 by the message receiver 310. The message receiver 310 forwards the received message package to the message parsing 320. The message parsing utilizes the predetermined message format associated with the facility to parse out the different informational portions of the received message. For example, the message parsing 320 extracts the message, the recipient information, and any other portions of the message package included therein.


Once all relevant elemental portions of the message have been extracted, the notification 330 proceeds to carry out message delivery. For example, at a minimum, the notification 330 retrieves the recipient information and the message, and forwards the message to all of the recipients identified. In an embodiment, the recipients are identified individually. In another embodiment, the recipients are identified as part of a group, such as a particular cell block, wing, or facility.


In an embodiment, delivery methods for each inmate are stored in a database located within the facility 101A, such as within site server 140. In this embodiment, when carrying out the deliver process, the notification 330 accesses the database and retrieved delivery methods for each recipient. Such delivery methods may include SMS or MMS message, email, PA announcement, or digital bulletin board, among others. The delivery method selected for each recipient may depend on the recipients available communication methods. For example, an inmate with an assigned wireless communication device will have SMS or MMS delivery methods selected, whereas an inmate without such a device will be limited to email (if he/she has such access), or PA/bulletin.


As discussed above, the notification 330 may also adjust the notification procedure based on the other data fields included in the message package. For example, if the message package includes a delivery time, the notification 330 will wait to transmit the message until the designated time. Other modifications are available based on other data fields in the message package.


In the manner described above, facilities are capable of receiving and disseminating messages to designated individuals housed therein.



FIG. 4 illustrates an exemplary data table for use with the exemplary messaging center of FIG. 2, according to embodiments of the present disclosure. The table includes numerous information useful for the dissemination of information to inmates. The database is organized according to facility, as shown in the first column 410. Each facility can be further broken down into smaller subsections of residents, such as cell blocks (shown in second column 420). There may be multiple, or different, subsections than that depicted, including wing, security level, responsible security officer, etc. Regardless of which, or how many, subsets are included in the database, each inmate is identified in correspondence with his/her relevant data points, such as shown in the third column 430. In the example shown in FIG. 4, inmate Peter Smith is a resident of Facility 1, Cell Block 1. In an embodiment, all inmates of the facility that are capable of receiving notifications via the notification system are identified in this database with their respective location information.


In addition to location and identification information, the database also includes delivery information. The delivery information should include at least a primary notification means, such as shown in the fourth column 440. In an embodiment, secondary or more notification means are also included, such as shown in the fifth column 450. The notification means shown in the fourth and fifth columns include a destination address for the inmate, where such an address exists, and a general notification description where no such address exists. For the example shown in FIG. 4, inmate peter smith should primarily be notified via his assigned wireless device at the device address: “AWD Address 1.” In an embodiment, the address of the assigned wireless device can be in the form of IP address, device identification, MAC address, etc. Secondarily, Peter Smith is to be notified via email at the address: “psmith@facility1.com.” In each of these communication methods, an address exists and is so identified in the database.


In a second example of FIG. 4, a second inmate of facility 1, John White, is primarily to be notified via his voice message box. For such a notification, no address is necessary because the central communication server 150 maintains a voice message box for each inmate through which he can send and receive messages with outsiders. Typically, upon next accessing the telecommunication system (or via other means), the inmate will receive notification of a pending message, upon which he can login to the system and retrieve his message. Secondarily, inmate John White is to be notified via bulletin, which requires that the message be posted somewhere publicly where he is likely to see the message. In an embodiment, the system 100 includes an electronic bulletin connected with the central communication server, that is configured to be updated with new notification information from the messaging 200 for publishing.


In the above embodiment, all the described data elements are included in a single database that is accessible by, and/or managed by, the central communication server 150. However, in another embodiment, it may be beneficial to maintain the delivery information at the facility, since that is where that information becomes relevant. In the former embodiment, the delivery information is packaged with the message information in the transmitted message, whereas in the latter embodiment, the delivery information can be omitted from the packaged message and determined at the site based on the identified recipients/groups. By maintaining a relational database of the inmates and all their relevant groups, the system is able to efficiently parse messages to all intended recipients without requiring a full list of those recipients. In an embodiment, the system also allows for the user to input an omission, such as a person of the identified delivery group to which the message will not be sent.



FIG. 5 illustrates a flowchart diagram of an exemplary method for generating and transmitting messages to inmates. In the embodiment, the system receives a message and a recipient identification from the user (510). In an embodiment, the recipient is a group of inmates at one or more facilities, which are identified by their group rather than individually. After the relevant information has been received, the system packages the message (520) together with all relevant delivery information, such as group identification, omission information, delivery time, and authorization status of the sender. In an embodiment, the packaging may also include an encoding scheme unique to the destination prison, if applicable.


Once packaged, the packaged message is transmitted to the one or more facilities that include recipient inmates (530). If the designated recipient group is limited to inmates of a single facility, then the message is transmitted only to that facility. On the other hand, if the designated recipient group includes inmates of multiple facilities, then the packaged message is sent to all of those facilities. In this latter scenario, if facility-specific encoding is required, a separate packaged message can be generated for each facility that has a different encoding scheme in that encoding scheme.


Once the message is received by the facility, the facility unpacks the packaged message using its encoding scheme (540). As a result of the unpacking of the message, the different portions of the packaged message are extracted and parsed. The facility-based delivery system analyzes the parsed information in order to determine when, how, and to whom the extracted message is to be delivered. The facility-based system then delivers the message in accordance with that determination (550).


As has been described above, the system for delivering messages includes two separate messaging systems, one centralized to receive a message, and forward relevant messaging information to designated facilities, and a second that is located on-site at a facility (or off-site, but which serves the facility) to handle final delivery responsibilities of the received message within the facility. However, in an embodiment, these two messaging system can be combined into a single system that has communication privileges within the facility for carrying out final delivery responsibilities.


Exemplary Computer Implementation


It will be apparent to persons skilled in the relevant art(s) that various elements and features of the present disclosure, as described herein, can be implemented in hardware using analog and/or digital circuits, in software, through the execution of computer instructions by one or more general purpose or special-purpose processors, or as a combination of hardware and software.


The following description of a general purpose computer system is provided for the sake of completeness. Embodiments of the present disclosure can be implemented in hardware, or as a combination of software and hardware. Consequently, embodiments of the disclosure may be implemented in the environment of a computer system or other processing system. For example, the method of FIG. 5 can be implemented in the environment of one or more computer systems or other processing systems. An example of such a computer system 600 is shown in FIG. 6. One or more of the modules depicted in the previous figures can be at least partially implemented on one or more distinct computer systems 600.


Computer system 600 includes one or more processors, such as processor 604. Processor 604 can be a special purpose or a general purpose digital signal processor. Processor 604 is connected to a communication infrastructure 602 (for example, a bus or network). Various software implementations are described in terms of this exemplary computer system. After reading this description, it will become apparent to a person skilled in the relevant art(s) how to implement the disclosure using other computer systems and/or computer architectures.


Computer system 600 also includes a main memory 606, preferably random access memory (RAM), and may also include a secondary memory 608. Secondary memory 608 may include, for example, a hard disk drive 610 and/or a removable storage drive 612, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, or the like. Removable storage drive 612 reads from and/or writes to a removable storage unit 616 in a well-known manner. Removable storage unit 616 represents a floppy disk, magnetic tape, optical disk, or the like, which is read by and written to by removable storage drive 612. As will be appreciated by persons skilled in the relevant art(s), removable storage unit 616 includes a computer usable storage medium having stored therein computer software and/or data.


In alternative implementations, secondary memory 608 may include other similar means for allowing computer programs or other instructions to be loaded into computer system 600. Such means may include, for example, a removable storage unit 618 and an interface 614. Examples of such means may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM, or PROM) and associated socket, a thumb drive and USB port, and other removable storage units 618 and interfaces 614 which allow software and data to be transferred from removable storage unit 618 to computer system 600.


Computer system 600 may also include a communications interface 620. Communications interface 620 allows software and data to be transferred between computer system 600 and external devices. Examples of communications interface 620 may include a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, etc. Software and data transferred via communications interface 620 are in the form of signals which may be electronic, electromagnetic, optical, or other signals capable of being received by communications interface 620. These signals are provided to communications interface 620 via a communications path 622. Communications path 622 carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link and other communications channels.


As used herein, the terms “computer program medium” and “computer readable medium” are used to generally refer to tangible storage media such as removable storage units 616 and 618 or a hard disk installed in hard disk drive 610. These computer program products are means for providing software to computer system 600.


Computer programs (also called computer control logic) are stored in main memory 606 and/or secondary memory 608. Computer programs may also be received via communications interface 620. Such computer programs, when executed, enable the computer system 600 to implement the present disclosure as discussed herein. In particular, the computer programs, when executed, enable processor 604 to implement the processes of the present disclosure, such as any of the methods described herein. Accordingly, such computer programs represent controllers of the computer system 600. Where the disclosure is implemented using software, the software may be stored in a computer program product and loaded into computer system 600 using removable storage drive 612, interface 614, or communications interface 620.


In another embodiment, features of the disclosure are implemented primarily in hardware using, for example, hardware components such as application-specific integrated circuits (ASICs) and gate arrays. Implementation of a hardware state machine so as to perform the functions described herein will also be apparent to persons skilled in the relevant art(s).


CONCLUSION

It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.


The disclosure has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.


It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the disclosure should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.

Claims
  • 1. A messaging platform of a controlled environment facility communication system, comprising: a database that stores inmate groupings, group locations, and message delivery mechanisms;a transceiver configured to receive a message from a source, and to transmit the message to a destination; andone or more processors configured to: receive message data from a user, the message data including the message, user identification information, and a destination identifier;identify a permission level of the user based on the user identification information, the permission level including a facility identifier; andretrieve from the database a message delivery mechanism from among the message delivery mechanisms for the message based on the destination identifier, the retrieved message delivery mechanism including a message type based on a recipient associated with the destination identifier, an encoding scheme specific to a destination facility associated with the destination identifier, and a packaging scheme specific to the destination facility;determine that the user is permitted to communicate with a destination associated with the destination identifier based on the permission level, andcause the transceiver to transmit a message package that includes the message to the destination according to the retrieved message delivery mechanism in response to the determining,wherein the packaging scheme defines data information to be included along with the message in the message package, including whether to include recipient information, message sender identification, transmission time, and permissions.
  • 2. The messaging platform of claim 1, wherein the destination identifier is an inmate within a controlled environment facility.
  • 3. The messaging platform of claim 2, wherein the retrieving includes identifying an inmate group associated with a location.
  • 4. The messaging platform of claim 3, wherein the retrieving includes identifying each inmate associated with the inmate group.
  • 5. The messaging platform of claim 4, wherein the retrieving includes identifying a corresponding message delivery mechanism from among the message delivery mechanisms associated with each of the inmates, and wherein the transceiver transmits the message to each of the inmates according to their corresponding message delivery mechanism.
  • 6. The messaging platform of claim 1, wherein the destination identifier identifies an inmate of a controlled environment facility.
  • 7. The messaging platform of claim 6, wherein the retrieving includes obtaining a delivery mechanism from among the message delivery mechanisms associated with the inmate.
  • 8. The messaging platform of claim 1, wherein the message delivery mechanism includes at least one of SMS text, MMS message, email, PA announcement, and digital bulletin posting.
  • 9. The messaging platform of claim 1, wherein the message data further includes a time component that defines when the message is to be sent to the destination.
  • 10. The messaging platform of claim 1, wherein the one or more processors are further configured to: verify the permission level of the user; andtransmit or deny transmission of the message based on the permission level.
  • 11. A method for message delivery in a controlled environment facility, comprising: storing, in a database, inmate groupings, group locations, and message delivery mechanisms;receiving message data from a user, the message data including the message, user identification information, and a destination identifier;identifying a permission level of the user based on the user identification information, the permission level including a facility identifier;retrieving from the database a message delivery mechanism from among the message delivery mechanisms for the message based on the destination identifier, the retrieved message delivery mechanism including a message type based on a recipient associated with the destination identifier, an encoding scheme specific to a destination facility associated with the destination identifier, and a packaging scheme specific to the destination facility;determining that the user is permitted to communicate with a destination associated with the destination identification based on the permission level, andtransmitting a message package that includes the message to the destination according to the retrieved message delivery mechanism in response to the determining,wherein the packaging scheme defines data information to be included along with the message in the message package, including whether to include recipient information, message sender identification, transmission time, and permissions.
  • 12. The method of claim 11, wherein the destination identifier is an inmate within the controlled environment facility.
  • 13. The method of claim 12, further comprising identifying an inmate group associated with a location.
  • 14. The method of claim 13, further comprising identifying each inmate associated with the inmate group.
  • 15. The method of claim 14, further comprising identifying a message delivery mechanism from among the stored message delivery mechanisms associated with each of the inmates; and transmitting the message to each of the inmates according to their corresponding message delivery mechanism.
  • 16. The method of claim 11, wherein the destination identifier identifies an inmate of the controlled environment facility.
  • 17. The method of claim 16, wherein the retrieving includes obtaining a message delivery mechanism from among the stored message delivery mechanisms associated with the inmate.
  • 18. The method of claim 11, wherein the message delivery mechanism includes at least one of SMS text, MMS message, email, PA announcement, and digital bulleting posting.
  • 19. The method of claim 11, wherein the message data further includes a tie component that defines when the message is to be sent to the destination.
  • 20. The method of claim 11, further comprising: verifying the permission level of the user; andtransmitting or denying transmission of the message based on the permission level.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 16/987,226 filed on Aug. 6, 2020, which is a continuation of U.S. patent application Ser. No. 15/592,944 filed on May 11, 2017, now U.S. Pat. No. 10,749,827, issued Aug. 18, 2020, which are incorporated by reference herein in their entireties.

US Referenced Citations (311)
Number Name Date Kind
4054756 Comella et al. Oct 1977 A
4191860 Weber Mar 1980 A
4652700 Matthews et al. Mar 1987 A
4766604 Axberg Aug 1988 A
4935956 Hellwarth et al. Jun 1990 A
5068888 Scherk et al. Nov 1991 A
5319702 Kitchin et al. Jun 1994 A
5351287 Bhattacharyya et al. Sep 1994 A
5535261 Brown et al. Jul 1996 A
5539812 Kitchin et al. Jul 1996 A
5553145 Micali Sep 1996 A
5648916 Manduley Jul 1997 A
5655013 Gainsboro Aug 1997 A
5705995 Lafflin et al. Jan 1998 A
5740231 Cohn et al. Apr 1998 A
5745558 Richardson, Jr. et al. Apr 1998 A
5768355 Salibrici et al. Jun 1998 A
5778313 Fougnies Jul 1998 A
5805810 Maxwell Sep 1998 A
5826034 Albal Oct 1998 A
5838790 McAuliffe et al. Nov 1998 A
5848397 Marsh et al. Dec 1998 A
5854975 Fougnies et al. Dec 1998 A
5872926 Levac et al. Feb 1999 A
5894558 Falker Apr 1999 A
5937037 Kamel et al. Aug 1999 A
5956717 Kraay et al. Sep 1999 A
5958005 Thorne et al. Sep 1999 A
5982506 Kara Nov 1999 A
5987611 Freund Nov 1999 A
6002689 Christie Dec 1999 A
6035327 Buckley et al. Mar 2000 A
6052454 Kek et al. Apr 2000 A
6061718 Nelson May 2000 A
6064963 Gainsboro May 2000 A
6067514 Chen May 2000 A
6092192 Kanevsky et al. Jul 2000 A
6097791 Ladd et al. Aug 2000 A
6137864 Yaker Oct 2000 A
6145004 Walsh Nov 2000 A
6151679 Friedman et al. Nov 2000 A
6161139 Win et al. Dec 2000 A
6173259 Bijl et al. Jan 2001 B1
6173284 Brown Jan 2001 B1
6192114 Council Feb 2001 B1
6226362 Gerszberg et al. May 2001 B1
6226363 Miller May 2001 B1
6233313 Farris et al. May 2001 B1
6233318 Picard et al. May 2001 B1
6246871 Ala-Laurila Jun 2001 B1
6249808 Seshadri Jun 2001 B1
6285777 Kanevsky et al. Sep 2001 B2
6304636 Goldberg et al. Oct 2001 B1
6356867 Gabai et al. Mar 2002 B1
6363414 Nicholls et al. Mar 2002 B1
6366651 Griffith et al. Apr 2002 B1
6389276 Brilla et al. May 2002 B1
6400272 Holtzman et al. Jun 2002 B1
6411685 O'Neal Jun 2002 B1
6477492 Connor Nov 2002 B1
6490611 Shen et al. Dec 2002 B1
6493447 Goss et al. Dec 2002 B1
6526335 Treyz et al. Feb 2003 B1
6560323 Gainsboro May 2003 B2
6570970 Gruchala et al. May 2003 B2
6591367 Kobata et al. Jul 2003 B1
6603838 Brown et al. Aug 2003 B1
6606648 Mukundan et al. Aug 2003 B1
6611583 Gainsboro Aug 2003 B1
6639977 Swope et al. Oct 2003 B1
6665378 Spielman et al. Dec 2003 B1
6665380 Cree et al. Dec 2003 B1
6668045 Mow Dec 2003 B1
6681114 Chang et al. Jan 2004 B2
6684248 Janacek et al. Jan 2004 B1
6714982 McDonough et al. Mar 2004 B1
6775359 Ron et al. Aug 2004 B1
6788771 Manto Sep 2004 B2
6801932 Picoult et al. Oct 2004 B1
6819932 Allison et al. Nov 2004 B2
6850147 Prokoski et al. Feb 2005 B2
6857024 Chen et al. Feb 2005 B1
6865260 Meadows et al. Mar 2005 B1
6879677 Trandal et al. Apr 2005 B2
6950502 Jenkins Sep 2005 B1
7003308 Fuoss et al. Feb 2006 B1
7013002 Link et al. Mar 2006 B2
7039071 Pekonen May 2006 B2
7039171 Gickler May 2006 B2
7039949 Cartmell et al. May 2006 B2
7046779 Hesse May 2006 B2
7058163 Parekh et al. Jun 2006 B1
7079636 McNitt et al. Jul 2006 B1
7085359 Crites et al. Aug 2006 B2
7095829 Claudatos et al. Aug 2006 B2
7106843 Gainsboro et al. Sep 2006 B1
7136462 Pelaez et al. Nov 2006 B2
7158621 Bayne Jan 2007 B2
7197560 Caslin et al. Mar 2007 B2
7248680 Gainsboro Jul 2007 B1
7256816 Profanchik et al. Aug 2007 B2
7260383 Ngan Aug 2007 B1
7265853 Kara et al. Sep 2007 B1
7277695 Petry et al. Oct 2007 B2
7278028 Hingoranee Oct 2007 B1
7333798 Hodge Feb 2008 B2
7359494 Leonard Apr 2008 B2
7363302 Lester Apr 2008 B2
7496345 Rae et al. Feb 2009 B1
7505406 Spadaro et al. Mar 2009 B1
7519076 Janssen et al. Apr 2009 B2
7519375 Polozola Apr 2009 B2
7551732 Anders Jun 2009 B2
7561679 Kalbag Jul 2009 B1
7561680 Falcone et al. Jul 2009 B1
7565687 Noguchi et al. Jul 2009 B2
7583974 Benco et al. Sep 2009 B2
7651680 Breton et al. Jan 2010 B2
7664689 Rosenfield et al. Feb 2010 B1
7673058 White et al. Mar 2010 B1
7681032 Peled et al. Mar 2010 B2
7742581 Hodge et al. Jun 2010 B2
7742582 Harper Jun 2010 B2
7783021 Hodge Aug 2010 B2
7804941 Keiser et al. Sep 2010 B2
7881446 Apple et al. Feb 2011 B1
7899167 Rae Mar 2011 B1
8000269 Rae et al. Aug 2011 B1
8005901 Ballinger Aug 2011 B2
8014800 Törnkvist Sep 2011 B2
8130919 Kalbag Mar 2012 B2
8180028 Falcone et al. May 2012 B1
8190121 Smith et al. May 2012 B2
8204177 Harper Jun 2012 B2
8218736 McClintock et al. Jul 2012 B1
8232862 Lowe Jul 2012 B2
8238534 Link et al. Aug 2012 B2
8243891 Hodge et al. Aug 2012 B2
8255300 Polozola et al. Aug 2012 B2
8458732 Hanna et al. Jun 2013 B2
8488756 Hodge et al. Jul 2013 B2
8509390 Harper Aug 2013 B2
8515031 Hodge et al. Aug 2013 B2
8577003 Rae Nov 2013 B2
8626118 Smith et al. Jan 2014 B2
8725115 Liu et al. May 2014 B2
8838622 Irving et al. Sep 2014 B2
9002395 Krukar Apr 2015 B2
9043813 Hanna et al. May 2015 B2
9077680 Harper Jul 2015 B2
9282188 Hodge et al. Mar 2016 B2
9306883 Hodge et al. Apr 2016 B2
9571500 Chachar et al. Feb 2017 B1
9621714 Seyfetdinov Apr 2017 B2
9667663 Hodge et al. May 2017 B2
9680878 Hodge et al. Jun 2017 B2
9680879 Hodge et al. Jun 2017 B2
9692718 Bennett Jun 2017 B2
9716600 Maluf Jul 2017 B1
9721239 Ho Aug 2017 B1
9757032 Gross et al. Sep 2017 B2
9787724 Hodge et al. Oct 2017 B2
9807123 Hodge et al. Oct 2017 B2
9871760 Torgersrud Jan 2018 B2
9871915 Hodge et al. Jan 2018 B2
9876915 Hodge et al. Jan 2018 B2
9923932 Hodge et al. Mar 2018 B2
9967291 Hodge et al. May 2018 B1
10116707 Hodge et al. Oct 2018 B2
10218842 Hodge et al. Feb 2019 B2
10397410 Hodge et al. Aug 2019 B2
10560488 Hodge et al. Feb 2020 B2
10749827 Hodge Aug 2020 B2
10757265 Seyfetdinov Aug 2020 B2
11509617 Hodge Nov 2022 B2
20010036821 Gainsboro et al. Nov 2001 A1
20020007453 Nemovicher Jan 2002 A1
20020054674 Chang et al. May 2002 A1
20020071537 Gainsboro Jun 2002 A1
20020111887 McFarlane et al. Aug 2002 A1
20020159600 Weiner Oct 2002 A1
20020183040 Lundstrom et al. Dec 2002 A1
20030002639 Huie Jan 2003 A1
20030009333 Sharma et al. Jan 2003 A1
20030070076 Michael Apr 2003 A1
20030083041 Kumar et al. May 2003 A1
20030086546 Falcone et al. May 2003 A1
20030099337 Lord May 2003 A1
20030126470 Crites et al. Jul 2003 A1
20030142364 Goldstone Jul 2003 A1
20030187939 O'Brien Oct 2003 A1
20030198325 Bayne Oct 2003 A1
20030200078 Luo et al. Oct 2003 A1
20030216983 Bodin Nov 2003 A1
20040029564 Hodge Feb 2004 A1
20040058667 Pienmaki et al. Mar 2004 A1
20040076272 Zafar et al. Apr 2004 A1
20040081296 Brown et al. Apr 2004 A1
20040114740 Gickler Jun 2004 A1
20040120475 Bauer et al. Jun 2004 A1
20040196963 Appelman et al. Oct 2004 A1
20040202327 Little et al. Oct 2004 A1
20040235520 Cadiz et al. Nov 2004 A1
20040236838 Tout Nov 2004 A1
20040252447 Hesse et al. Dec 2004 A1
20050010573 Garg Jan 2005 A1
20050053221 Reding et al. Mar 2005 A1
20050055411 Bouchard Mar 2005 A1
20050078612 Lang Apr 2005 A1
20050080868 Malik Apr 2005 A1
20050094794 Creamer et al. May 2005 A1
20050114192 Tor et al. May 2005 A1
20050125226 Magee Jun 2005 A1
20050207341 Zhang Sep 2005 A1
20050265322 Hester Dec 2005 A1
20050286498 Rand et al. Dec 2005 A1
20050287993 Gogic Dec 2005 A1
20060062355 Leonard Mar 2006 A1
20060087554 Boyd et al. Apr 2006 A1
20060098796 Link May 2006 A1
20060149644 Sulmar et al. Jul 2006 A1
20060168015 Fowler Jul 2006 A1
20060182232 Kerr et al. Aug 2006 A1
20060245552 Hayashi Nov 2006 A1
20060245559 Hodge et al. Nov 2006 A1
20060245579 Bienfait et al. Nov 2006 A1
20070041545 Gainsboro Feb 2007 A1
20070044734 Maloney et al. Mar 2007 A1
20070047006 Sakai Mar 2007 A1
20070155411 Morrison Jul 2007 A1
20070165790 Taori et al. Jul 2007 A1
20070195751 Cai et al. Aug 2007 A1
20070207785 Chatterjee et al. Sep 2007 A1
20070233610 Gyllenskog Oct 2007 A1
20070239898 Friend et al. Oct 2007 A1
20070263853 Pearson et al. Nov 2007 A1
20070283006 Hong Dec 2007 A1
20070285385 Albert Dec 2007 A1
20080037722 Klassen Feb 2008 A1
20080126951 Sood et al. May 2008 A1
20080200152 Moore Aug 2008 A1
20080219414 Ramamoorthy et al. Sep 2008 A1
20080249778 Barton et al. Oct 2008 A1
20080260118 Lyle Oct 2008 A1
20090054031 Smith et al. Feb 2009 A1
20090086631 Jayapalan et al. Apr 2009 A1
20090086725 Lai Apr 2009 A1
20090086936 Clifford et al. Apr 2009 A1
20090147937 Sullhan et al. Jun 2009 A1
20090197622 Atarius Aug 2009 A1
20090201886 Lee et al. Aug 2009 A1
20090203361 Huang et al. Aug 2009 A1
20090274279 Reynolds Nov 2009 A1
20090307321 Sawant Dec 2009 A1
20090320115 Dean Dec 2009 A1
20100023472 Loeb Jan 2010 A1
20100054433 Gustave et al. Mar 2010 A1
20100056110 Liu et al. Mar 2010 A1
20100124938 Wu May 2010 A1
20100138357 Mufti-Bey Jun 2010 A1
20100153114 Shih et al. Jun 2010 A1
20100189228 Seyfetdinov Jul 2010 A1
20100241663 Huang et al. Sep 2010 A1
20100254263 Chen et al. Oct 2010 A1
20100299761 Shapiro Nov 2010 A1
20100318441 Harper Dec 2010 A1
20110106894 Hodge et al. May 2011 A1
20110286585 Hodge Nov 2011 A1
20110286591 Fulton et al. Nov 2011 A1
20120011277 Kawahara Jan 2012 A1
20120094680 Stackelius et al. Apr 2012 A1
20120202454 Smith et al. Aug 2012 A1
20130058274 Scherzer et al. Mar 2013 A1
20130144951 Viswanath Jun 2013 A1
20130160108 Stachel Jun 2013 A1
20130162423 Rowe et al. Jun 2013 A1
20130179949 Shapiro Jul 2013 A1
20130246535 Yadava et al. Sep 2013 A1
20140020063 Hodge et al. Jan 2014 A1
20140044242 Hodge et al. Feb 2014 A1
20140280631 Torgersrud Sep 2014 A1
20150043721 Hodge et al. Feb 2015 A1
20150046978 Hodge et al. Feb 2015 A1
20150047004 Hodge et al. Feb 2015 A1
20150066523 Pan Mar 2015 A1
20150103990 Lee Apr 2015 A1
20150143215 Hu et al. May 2015 A1
20150181489 Chong et al. Jun 2015 A1
20150201080 Hodge et al. Jul 2015 A1
20150201081 Hodge et al. Jul 2015 A1
20150215254 Bennett Jul 2015 A1
20150223705 Sadhu Aug 2015 A1
20160142537 Hodge et al. May 2016 A1
20160156625 Hodge et al. Jun 2016 A1
20160164875 Zhang Jun 2016 A1
20160381082 Hodge et al. Dec 2016 A1
20170127257 Saxena et al. May 2017 A1
20170142258 Seyfetdinov May 2017 A1
20170230285 Crabtree Aug 2017 A1
20170279857 Hodge et al. Sep 2017 A1
20170302756 Chou et al. Oct 2017 A1
20170324834 Hodge Nov 2017 A1
20180213090 Hodge et al. Jul 2018 A1
20180288144 Tondepu et al. Oct 2018 A1
20180331987 Hodge Nov 2018 A1
20190132364 Hodge et al. May 2019 A1
20200252438 Hodge et al. Aug 2020 A1
20210021554 Hodge Jan 2021 A1
20210021708 Seyfetdinov Jan 2021 A1
20210083995 West Mar 2021 A1
20210377317 Hodge Dec 2021 A1
Foreign Referenced Citations (6)
Number Date Country
0989720 Mar 2000 EP
2400284 Oct 2004 GB
2436182 Sep 2007 GB
2001060157 Mar 2001 JP
WO 9921330 Apr 1999 WO
WO 9948054 Sep 1999 WO
Non-Patent Literature Citations (67)
Entry
David et al., “Privacy Concerns Regarding the Monitoring of Instant Messaging in the Workplace: Is it Big Brother or Just Business”, Nev. LJ5(2004).
O'Hagan et al., “Addressing the Corrections Crisis with Software Technology”, Computer, vol. 43, Issue:2, Feb. 2010, pp. 90-93.
Lindfield et al. “A new approach to prison control room design”, Proceedings IEEE 33rd Annual 1999 International Conference on Security Technology, Jan. 1999, IEEE Publishing.
“Cisco IAD2400 Series Business-Class Integrated Access Device”, Cisco Systems Datasheet, 2003.
“SIP and IPLinkTM in the Next Generation Network: An Overview,” Intel, 2001.
“Voice Over Packet in Next Generation Networks: An Architectural Framework,” Bellcore, Special Report SR-4717, Issue 1, Jan. 1999.
“Criminal Calls: A Review of the Bureau of Prisons' Management of Inmate Telephone Privileges,” U.S. Department of Justice, Office of the Inspector General, Aug. 1999.
“Why Can't You Make a Collect Call to a Cell Phone,” National Public Radio, Jun. 30, 2008, Accessed via http://www.npr.org/templates/story/story.php?storyId=92021561 on Apr. 6, 2015.
1800MumDad.com.au—Explanation, Aug. 29, 2007—Retrieved from the Internet Archive Wayback Machine at https://web.archive.org/web/20070829114354/http://1800mumdad.com.au/main.php?type=charges2; 2 pages.
1800MumDad.com.au—Summary Standard Form of Agreement, Apr. 26, 2006—Retrieved from the Internet Archive Wayback Machine at https://web.archive.org/web/20060426180115/http://www.1800mumdad.com.au/main.php?type=summarysfoa; 3 pages.
Advanced Technologies Group, Inc., White Paper: Introduction to Advanced Technologies Group, Inc., Inmate Correspondence System, Aug. 5, 2002, American Corrections Association Annual Conference, Anaheim, California.
Advanced Technologies Group, Inc., Correspondence System Poster, published Jul. 29, 2002 by Exhibit-Resources Midwest, displayed at Aug. 2002 American Corrections Association Annual Conference, Anaheim, California.
Advanced Technologies Group, Inc., Offender Management Suite: Correspondence System Brochure, printing invoice dated Aug. 2, 2002, brochure distributed at Aug. 2002 American Corrections Association Annual Conference, Anaheim, California.
Ahimovic et al., “Services for Tomorrow's PCS,” IEEE International Conference on Universal Personal Communications, vol. 1, Oct. 12-15, 1993; pp. 222-227.
Avtalion, J., “Keeping tabs on call centres,” Telecommunications, vol. 31, No. 7, Jul. 1997, pp. 70-72.
Brown, et al., “SMS: The Short Message Service,” Computer, vol. 40, No. 12, 2007.
BubbleLINK® Software Architecture (Science Dynamics 2003).
Bur Goode, Voice Over Internet Protocol (VoIP), Proceedings of the IEEE, vol. 90, No. 9, 1495-1517 (Sep. 2002).
Clifford J. Weinstein, MIT, The Experimental Integrated Switched Network—A System-Level Network Test Facility (IEEE 1983).
Commander Call Control System, Rev. 1.04 (Science Dynamics 2002).
Confalone et al., “Calling Card Service—TSPS Hardware, Software, and Signaling Implementation,” The Bell System Technical Journal, Sep. 1982, vol. 61, No. 7; pp. 1675-1714.
Creps, et al., “Is somebody watching? Employee communications and privacy,” Risk Management vol. 44, No. 4, Apr. 1997, pp. 22-28.
Digital “Bellcore Notes on the Networks,” Bellcore, Special Report SR-2275, Issue 3, Dec. 1997.
English-language Abstract for European Patent Publication No. 0989720 A1; 2 pages.
Excerpts from U.S. Appl. No. 60/538,933 to Shapiro, filed Jan. 22, 2004, 7 pages.
Excerpts from the Prosecution History of U.S. Appl. No. 10/135,878, filed Apr. 29, 2002.
File Wrapper of Reexamination U.S. Appl. No. 90/012,802 of U.S. Pat. No. 8,190,121, filed Mar. 1, 2013.
Garner, et al., “Mobile Terminated SMS Billing—Exploits and Security Analysis,” IEEE International Conference on Information Technology: New Generations, 2006.
Henry, M., “Unethical staff behavior,” Corrections Today, vol. 60, No. 3, Jun. 1, 1998.
International Search Report and Written Opinion directed to International Patent Application No. PCT/US2016/018653, mailed May 30, 2016; 11 pages.
International Search Report and Written Opinion directed to International Patent Application No. PCT/US2017/031321, mailed Jul. 14, 2017; 13 pages.
Jeff Hewett and Lee Dryburgh, Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Services (Networking Technology) at 85 (Cisco Press, Jun. 2005).
Maghan, J., “Intelligence Gathering Approaches in Prisons,” Low Intensity Conflict & Law Enforcement, vol. 3. No. 3, 1994, pp. 548-557.
McKitterick et al., “State of the Art Review of Mobile Payment Technology,” Department of Computer Science, Trinity College Dublin; 22 pages.
Operator Service System Generic Requirements, OSSGR, TR-TSY-000271, Collect Billing, Rev. 3, Mar. 1988; 50 pages.
Osifchin, N., “A Telecommunications Buildings/Power Infrastructure in a New Era of Public Networking,” IEEE 2000.
PacketCableTM 1.0 Architecture Framework Technical Report, PKT-TR-ARCH-V0 1-001201 (Cable Television Laboratories, Inc. 1999).
Pages from http://www.corp.att.com/history, archived by web.archive.org on Nov. 4, 2013.
Photocopy of “Bellcore Notes on the Networks (Formerly BOC Notes on the LEC Networks),” Bellcore, Special Report SR-2275, Issue 3, Dec. 1997.
Procops, T., “Advanced call logging for public safety organizations,” Public Management, vol. 82, vol. 3, Mar. 2000, pp. 17-19.
Prosecution History of U.S. Appl. No. 11/045,589, filed Jan. 28, 2005.
Rey, R.F., ed., “Engineering and Operations in the Bell System,” 2nd Edition, AT&T Bell Laboratories: Murray Hill, NJ, 1983.
Schwartz, et al., “How to Build an SMS Service,” O'Reilly Short Cuts, 2007.
Science Dynamics, Inmate Telephone Control Systems, http://scidyn.com/fraudprev_main.htm (archived by web.archive.org on Jan. 12, 2001).
Science Dynamics, SciDyn BubbleLINK, http://www.scidyn.com/products/bubble.html (archived by web.archive.org on Jun. 18, 2006).
Science Dynamics, SciDyn Call Control Solutions: Commander II, http://www.scidyn.com/products/commander2.html (archived by web.archive.org on Jun. 18, 2006).
Science Dynamics, SciDyn IP Gateways, http://scidyn.com/products/ipgateways.html (archived by web.archive.org on Aug. 15, 2001).
Science Dynamics, Science Dynamics—IP Telephony, http://www.scidyn.com/iptelephony_maim.htm (archived by web.archive.org on Oct. 12, 2000).
Shearer, G., “How logging and monitoring technologies improve quality in a call center,” Telemarketing & Call Center Solutions, vol. 16, No. 7, Jan. 1998, pp. 92-101.
Smith, M., “Corrections Turns Over a New LEAF: Correctional Agencies Receive Assistance From the Law Enforcement Analysis Facility,” Corrections Today, Oct. 1, 2001.
Sundstrom, K., “Voice over IP: An Engineering Analysis,” Master's Thesis, Department of Electrical and Computer Engineering, University of Manitoba, Sep. 1999.
The Line Information Database (LIDB) and Wireless Services, Telcordia Technologies White Paper, Dec. 2001; 31 pages.
U.S. Appl. No. 15/288,520, “Electronic Messaging Device,” to Hodge et al., filed Oct. 7, 2016.
U.S. Appl. No. 60/036,689, filed Jan. 31, 1997, titled Database Origami.
U.S. Appl. No. 60/246,070, “Employee Online Activity Monitoring System,” to Mcfarlane, et al., filed Nov. 7, 2000.
U.S. Appl. No. 60/500,725, “SMS Message Processing,” to Claudatos, filed Sep. 4, 2003.
U.S. Appl. No. 60/607,447, “IP-based telephony system and method,” to Apple, et al., filed Sep. 3, 2004.
U.S. Appl. No. 60/935,634, “Method of Enabling an SMS Text Message to Facilitate Payment on a Cellular Bill for a Billable Call Received on a Cell Phone,” to Martin, et al., filed Aug. 23, 2007.
Valcourt, et al., “Investigating mobile payment: Supporting technologies, methods, and use,” IEEE International Conference on Wireless and Mobile Computing, Networking, and Communications, 2005.
Web pages from “Electronic Message Solutions Inc. (EMS): Improving Relationships through faster Correspondence,” 2004, 9 pages; retrieved from http://www.inmatemail.com.
Wenndt, et al., “Content recognition for telephone monitoring,” Proceedings of the SPIE—The International Society for Optical Engineering, vol. 4232, 2001, pp. 274-280.
Wireless Interconnection and Reciprocal Compensation Agreement Between Community Telephone Company and United States Cellular Corporation, Apr. 24, 2006; 29 pages.
Examination Report directed to related Australian Patent Application No. 2017260202, mailed Mar. 16, 2021; 7 pages.
OMA, “Service User Profile Management Requirements”, Candidate Version 1.0, Sep. 2009.
Monshi et al., “Project CS 2008 Product Report”, Jan. 15, 2009.
Pallickara et al., “A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems”, 2006 7th IEEE/ACM International Conference on Grid Computing, Sep. 28, 2006.
Spindler et al., “Privacy in Video Surveilled Areas”, Proceedings of the 2006 International Conference on Privacy, Security, and Trust:Bridge the Gap Between PST Technologies and Business Services, Oct. 2006, ACM Publishing.
Related Publications (1)
Number Date Country
20230155970 A1 May 2023 US
Continuations (2)
Number Date Country
Parent 16987226 Aug 2020 US
Child 17989394 US
Parent 15592944 May 2017 US
Child 16987226 US