The following description relates generally to establishment of payment accounts, and more particularly to systems and methods for proactively establishing third-party payment accounts for payment for services, such as telecommunication services, rendered to a resident of a controlled-environment facility, such as a prison facility.
Various types of controlled-environment facilities are present in today's society, and persons may be voluntary or involuntary residents of such controlled-environment facilities temporarily or permanently. Examples of such controlled-environment facilities include correctional facilities (e.g., municipal jails, county jails, state prisons, federal prisons, military stockades, juvenile facilities, detention camps, and home incarceration environments), healthcare facilities (e.g., hospitals, nursing homes, mental health facilities, and rehabilitation facilities, such as drug and alcohol rehabilitation facilities), restricted living quarters (e.g., hotels, resorts, camps, dormitories, and barracks), and the like. Certain controlled-environment facilities may be thought of as a small community or city, perhaps walled or otherwise access restricted, wherein various activities occur within the community and between the community and those outside the community in the daily operation thereof. Such a community may include a number of individuals and enterprises directly associated therewith, including management, staff, and inmates, residents, patients, or guests (herein referred to as “residents”), and a number of individuals and enterprises indirectly associated therewith, including friends and family of residents, vendors, government agencies, providers of services to residents, and individuals with a connection to the facility or its residents.
Various services are commonly rendered to residents of controlled-environment facilities, such as provision of telephony and/or other communication services, provision of information access (e.g., Internet access), provision of consumer goods (e.g., commissary items), etc. Many of such services are provided at a fee. That is, the facility and/or provider of such service may charge a fee for the provision of such services to a resident.
Third parties are often relied upon for payment of any such fees charged. For instance, the residents of a controlled-environment facility may not have funds readily accessible to them, and therefore third parties may be relied upon to pay for services rendered to the residents. In some instances, the third-party payer may be a party to the service provided to a resident, such as when the third party pays for telephony charges incurred for a call from the resident to the third party. In other instances, the third-party payer may not be a party to the service rendered to the resident, such as when the resident purchases a commissary item within the controlled-environment facility using funds of the third-party payer.
As discussed further below, various types of payment accounts (or “billing arrangements”) may be established with a third-party payer for payment for services rendered to a resident of a controlled-environment facility. A given third-party payment account may be a pre-funded (or “prepaid”) account, or some other type of billing arrangement. In some instances, a type of payment account that is acceptable to the service provider may be determined at least in part on a determined risk score for the third-party payer and/or the resident of the controlled-environment facility. Such risk score may be determined based on various factors, such as described in co-pending U.S. patent application Ser. No. 11/480,264 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT” filed Jun. 30, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 11/386,032 titled “SYSTEMS AND METHODS FOR ACCOUNT MANAGEMENT USING INTERRUPT MESSAGE” filed Mar. 21, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 10/360,248 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT USING INTERRUPT MESSAGING” filed Feb. 7, 2003, and/or as described in co-pending and commonly assigned U.S. patent applications: Ser. No. 10/360,442 filed Feb. 7, 2003 titled “SYSTEMS AND METHODS FOR TRANSACTION AUTHORIZATION DETERMINATION;” Ser. No. 11/386,056 filed Mar. 21, 2006 titled “MANAGEMENT OF PROVISION OF SERVICES BASED AT LEAST IN PART ON INFORMATION ABOUT A PAYOR'S UTILITY,” the disclosures of which are incorporated herein by reference.
The generation of revenue and profit is the driving force behind most business models. To supplement the cash purchasing methods in today's credit-based society, most businesses depend on some form of credit or entitlement authorization mechanism allowing for customers to purchase products, services, or other such items without the immediate physical exchange of cash. Inherent in such business models is the reality that a percentage of parties who purchase on credit or entitlement authorizations may eventually not pay, thus diminishing the business' overall profitability.
In order to balance the risk of such losses against the benefits of maintaining credit entitlement systems, businesses go to great lengths in making credit worthiness or other transaction authorization/verification determinations (collectively referred to herein as “transaction authorization determinations”), such as requiring lengthy applications including a wealth of personal information, accessing databases storing information about the potential borrower, and the like. This process is typically relatively slow and often-times results in a poor transaction authorization determination. For example, in order to minimize losses associated with poor credit risks, a transaction authorization determination implemented according to many business models may error on the conservative side, thereby foregoing a transaction having a collectable debt situation associated therewith because of a lack of information or insufficient analysis of decision criteria.
One example of a business model that generally requires more immediate credit/authorization determinations is the telecommunication provider industry, and, more particularly, businesses that provide telecommunication services to controlled-environment facilities, such as prisons. Prisoners are generally given some form of access to telephones, but the calls must be paid for. Telephone calls made by prisoners are typically made collect, wherein the called party accepts charges for the call.
As with other credit/authorization systems, some of the collect calls may never be paid for by the called parties. In such circumstances, the telecommunication service provider fails to recover the costs of providing the call, which, in turn, causes a loss of profitability. Bad debt losses may sometimes reach into the tens of millions of dollars for each telecommunication service provider with the industry total well over $1 billion. To address the risk of loss on some of the attempted prison calls, telecommunication service providers sometimes obtain information on the called parties in order to establish a customer database for providing call verification/authorization. When a prisoner attempts to make a collect call, the call or transaction request goes through a validation process. The telecommunication service provider accesses its customer databases and may be able to determine (1) can this call be billed (i.e., is there a billing arrangement with the local exchange carrier ((LEC) or the called party), (2) if the destination number is already in the service provider's files, has the allotted credit limit been reached, and (3) has there been any information received from the LEC indicating that the called party has not been paying his/her telephone bills. Depending on the extensiveness of the service provider's internal resources, the service provider may not be able to determine all three of these validation criteria. If favorable information is retrieved for each of the available validation criteria, the call is completed.
Conversely, if the prisoner attempts to call a destination number that is not already in the customer database, or if negative information is retrieved from the validation process, the service provider typically blocks the call from being completed. While these blocked calls save the telecommunication provider from losses for unpaid calls, some of those blocked calls represent lost potential revenue and profit that the provider would have generated. Thus, the telecommunication provider often encounters conflicting desires of: 1) connecting as many calls as possible to maximize the provider's billings; and 2) guarding against connecting calls that will likely not be paid, in attempt to maximize the amount of collections obtained from the provider's billings.
Traditionally, one of at least three (3) different types of third-party payment accounts (or arrangements) is implemented for telephone calls made by prisoners: 1) LEC billing, 2) direct billing, and 3) prepaid accounts. Each of these types of third-party payment accounts is described briefly below.
In LEC billing, the prison's telecommunication service provider typically sends the collect call bill to the LEC that services the called number. Thus, the prison's telecommunication service provider relies upon the called party's LEC for billing the called party for the charges incurred by the called party for collect calls from a prisoner. LECs, such as, Southwestern Bell, Verizon, BellSouth, Ameritech, and the like generally maintain accurate billing, name, and address (BNA) information, and may be authorized to bill third-party-provided telecommunication services if billing arrangements exist. It should be noted that for purposes of this disclosure, LEC is intended to include not only local exchange carriers, but also competitive LECs (CLECs), inter-exchange carriers (IXCs), and the like. LECs typically bill on a thirty-day billing cycle (i.e., provide a post-pay system that bills each customer for the telephone activity that occurred over the preceding thirty days). As with every other credit transaction, some LEC customers may fail to pay their bills. When this happens, the LECs recover any costs for providing the prisoner's call directly from the prison telecommunication service provider. Thus, the prison telecommunication service provider carries all of the losses for the unpaid collect calls originating from the prison, which generally effects the provider's profit realization.
Moreover, because of the LECs' typical thirty-day billing cycle, the prison telecommunication provider may not become aware that the bill has become delinquent for a minimum of 120 days after the bill was originally sent to the LEC (LECs may not declare a particular bill uncollectable for 120 days or more in many circumstances). Thus, the service provider would not know to block further calls to that destination number for anywhere from four months to over a year. If calls continue to the delinquent destination number during that period, a substantial amount of revenue and profits would simply be lost.
Further, by its nature, the market segment of customers whom the prison telephony service provider bills includes individuals that have particularly high-risk credit. For instance, individuals in this market segment are very often transient, fraudulent, and/or otherwise untrustworthy. Certain steps may be taken by the prison's telephony service provider in attempt to evaluate the credit worthiness of the party to be billed (e.g., the party whom a prisoner is attempting to call collect). For instance, before connecting a requested collect call, the prison's telephony system may access a line information database (LIDB) that contains subscriber information for the called party, and the prison's telephony system may use information obtained from the LIDB to evaluate whether to connect the collect call to such called party.
Regardless of these measures, however, it is often difficult to ensure that the customer (e.g., called party of a collect call) will pay the bill. One reason for this difficulty is that oftentimes the calling party is in prison for only a limited period of time. Thus, the prison's telephony service provider has limited leverage over the billed party. That is, once the prisoner is released from prison, the prison's telephony service provider loses its ability to apply leverage to the called party by requiring that the called party pay its outstanding bill before allowing another call from the prisoner to such called party. Additionally, it is difficult to maintain visibility of the called party by the prison's telephony service provider so as to enforce such leverage (i.e., to require that the called party pay his/her outstanding bill before allowing the prisoner to connect to the called party again), as the called party can easily change his/her telephone service from one LEC to another.
In direct billing, the service provider bills the called party directly. That is, rather than using the called party's LEC for billing the called party for charges incurred for collect calls from a prisoner, the prison's telecommunication service provider may directly bill the called party for such charges. For example, in some instances, a called party's LEC may not have a billing arrangement with the prison telecommunication service provider, in which case the service provider may resort to billing the called party directly. Such direct billing provides the service provider with improved visibility of the called party. Such direct billing method alleviates the service provider's dependency on the LEC for billing, and provides the service provider better exposure to the called party and the called party's payment history for charges incurred for calls made by a prisoner to the called party. That is, the direct billing method may enable the service provider to better track whether a given called party has paid for previous charges incurred for calls made by a prisoner. Of course, such direct billing imposes certain burdens on the service provider, such as tasks associated with identifying the called party's billing address (e.g., by obtaining the BNA from the called party's LEC), generating a bill, sending the bill, initiating collections efforts if needed, etc.
As an example of a prepaid (or “pre-funded”) account payment method, a prepaid account may be established for a called party, wherein calls placed by a prisoner to such called party can be charged (e.g., by the called party) against the prepaid account. That is, as a call is conducted, the charges for the call are decremented from the called party's prepaid account. Once depleted, the called party may be prompted to add additional funds to the account to permit the call to continue and/or to permit future calls. As another example of a prepaid account payment method, a prepaid account may be established for a given prisoner (which may be funded by friends and/or family of the prisoner), and the prisoner may charge calls made to any parties against the prisoner's prepaid account. In some instances, the prisoner's prepaid account may also be used for purchasing commissary goods and/or for obtaining other goods/services that may be available to the prisoner at a fee. Such prepaid account payment methods are generally the payment method having the least risk to the service provider because it ensures that the funds for a call are available to the service provider.
As described further herein, in many instances an opportunity to provide service to a resident of a controlled-environment facility may be perishable. For instance, as mentioned above, in many instances an inmate may only be detained in a prison facility for a relatively short period of time before being released (e.g., upon a posting of bail, etc.). Thus, while determination and establishment of an acceptable or preferred type of third-party payment account may be desirable to minimize the risk of loss to a service provider, it is often desirable to pre-establish such third-party payment accounts efficiently (e.g., before the resident demands the service) so as to avoid missed opportunities for business/revenue by the service provider.
The present invention is directed to systems and methods for proactively establishing a third-party payment account for services rendered to a resident of a controlled-environment facility (CEF). According to certain embodiments of the present invention, a campaign-triggering event is detected, which triggers contact of prospective third-party (“3rd-party”) payers for a resident of a CEF in order to encourage such prospective 3rd-party payers to establish 3rd-party payment accounts for the resident. In this manner, the prospective 3rd-party payers are proactively contacted prior to an expected future demand for service by the resident.
As an example, upon an inmate being booked into a prison facility, prospective 3rd-party payers for the inmate may be determined and a campaign initiated to notify the prospective 3rd-party payers of the inmate's incarceration and encourage the 3rd-party payers to proactively establish a 3rd-party payment account for payment for certain expected services that may be desired by the inmate while incarcerated, such as telephony services. As described further herein, a “risk score” may be determined for the 3rd-party payer and acceptable and/or preferred payment account type(s) may be determined, wherein the campaign may encourage the 3rd-party payer to establish such an acceptable and/or preferred payment account type. In certain embodiments, incentives (e.g., discounted rates, added funds to the account, a number of free services, such as a free call) may be offered to the prospective 3rd-party payer to further entice the 3rd-party payer to proactively establish an acceptable and/or preferred 3rd-party payment account type.
Today, the establishment of 3rd-party payment accounts for residents of CEFs is undesirably slow and/or inefficient in many cases, which may lead to delay of provision of services to the residents and/or lost business opportunities to a service provider. For example, in a typical prison facility, when an inmate is initially arrested and booked into the facility, the inmate is placed in a holding cell (or other “holding area”). While being held (or “detained”), the prisoner may use the prison's telephony system to attempt to place a telephone call. In doing so, the prisoner dials the billed telephone number (BTN) of the 3rd-party to whom the prisoner desires to call, and that BTN is captured by a validation platform, which performs certain processing to determine whether the call should be completed. Such validation may include determination of whether the BTN is a number to which calls by the inmate are not permitted (e.g., whether the 3rd-party whom the inmate is attempting to call is a victim of a crime committed by the inmate, a judge, etc.), determination of a risk score for the inmate and/or called party, determination (e.g., based on the determined risk score) of an appropriate and/or preferable 3rd-party payment account type (e.g., LEC billing, direct billing, prepaid account, etc.), establishment of such a 3rd-party payment account types, etc. This validation process may be undesirably lengthy, sometimes taking anywhere from 15 minutes to 24 hours before the desired telephony service can be rendered to the inmate. Upon an inmate being booked into a prison facility, reducing the time delay associated with providing such desired telephony service to the inmate may be desirable to the inmate (e.g., to enable the inmate to more quickly contact 3rd parties to arrange bail, etc.), the prison's telephony service provider (e.g., to ensure greater likelihood that the perishable business opportunity will not be missed, and to thus improve revenue opportunities of the service provider), and even to the prison (e.g., to more quickly enable the inmate to arrange bail, etc., so as to reduce the amount of time that the inmate consumes the limited capacity of the prison facility's holding areas, many of which face overcrowding situations).
The inventors of the present application have recognized the above-mentioned desire to facilitate prompt establishment of 3rd-party payment accounts. For instance, the inventors have recognized that certain business opportunities may be lost if a 3rd-party payment account is not efficiently established for a resident of a CEF. That is, as described herein, in many instances an opportunity to provide service to a resident of a CEF may be perishable. For instance, in many instances an inmate of a prison facility is detained in such prison facility for a relatively brief time period before being released (e.g., upon a posting of bail, etc.). As another example, while a resident of a CEF (e.g., while incarcerated in a prison), a given perishable event, such as the resident's birthday, the birthday of a loved one (e.g., relative, friend, etc.) of the resident, an anniversary of the resident and/or loved one, etc., may give rise to a perishable opportunity for business. For instance, a desire may arise at or near the time of such an event for the resident to place a telephone call (e.g., to wish a loved one happy birthday or happy anniversary). Thus, in many instances certain business opportunities for service providers who provide services to residents of a CEF are perishable opportunities.
Accordingly, embodiments of the present invention advantageously enable 3rd-party party payment accounts to be proactively established in anticipation of such perishable opportunities arising, thus affording greater likelihood that the perishable business opportunity will not be lost.
According to certain embodiments, information-capture triggering events are detected, which trigger the capture of information about prospective 3rd-party payer(s) for a given resident of a CEF. Examples of such information-capture triggering events include a resident being identified as potentially becoming a resident of the CEF (e.g., a person becoming a person under suspicion of a crime and thus identified as potentially becoming an inmate of a prison), the resident being checked into the CEF (e.g., an inmate being booked into a prison facility), and/or other events that may indicate that prospective 3rd-party payer information may be available for capture for a given resident.
In response to detection of such an information-capture triggering event, information about prospective 3rd-party payer(s) for the resident is determined. Various such information about prospective 3rd-party payer(s) may be determined, including identification of the prospective 3rd-party payer(s) (e.g., their names, etc.), the prospective 3rd-party payer(s) respective contact information (e.g., telephone number, email address, etc.), and/or other information about the prospective 3rd-party payer(s). Such information may be determined in any of variety of different ways. As one example, in certain embodiments, information is determined from prior-collected information. For instance, the given resident may be a returning resident of a CEF (e.g., an inmate of a prison facility who has been previously incarcerated in the prison system), wherein 3rd-party payer information may have been collected for the resident during a previous residency in the CEF. As another example, the resident may interact with a user who enters such prospective 3rd-party payer information into a computer system. For instance, upon a resident arriving at a CEF, a user may query the resident for information about prospective 3rd-party payer(s) whom the resident expects may establish 3rd-party payment accounts for payment for services rendered to the resident while in the CEF. As still another example, the resident (or an associate/representative of such resident, such as a friend or family member of the resident) may interact directly with a computer system to input such prospective 3rd-party payer information.
Campaign-triggering event(s) may be detected to trigger a campaign in which the identified prospective 3rd-party payer(s) of a resident are contacted and encouraged to establish a 3rd-party payment account for the resident. The campaign-triggering event may be the same event that triggered the capture of the prospective 3rd-party payer information, as mentioned above, or it may be a different event. Examples of such campaign-triggering event(s) include the resident being identified as potentially becoming a resident of the CEF (e.g., a person becoming a person under suspicion of a crime and thus identified as potentially becoming an inmate of a prison), the resident being checked into the CEF (e.g., an inmate being booked into a prison facility), detection of an upcoming perishable date of interest for the resident or an associate (e.g., friend, family member, etc.), such as the resident's or an associate's birthday or anniversary, a holiday, etc., and/or other events that may give rise to prospective 3rd-party payer(s) desiring to establish 3rd-party payment accounts for expected service demands of the resident.
In response to detection of the campaign-triggering event(s), the campaign system contacts the prospective 3rd-party payer(s) and provides such prospective 3rd-party payer(s) an opportunity to establish 3rd-party payment accounts for the resident of the CEF. For instance, in certain embodiments, an automatic dialer may be employed to place outbound telephone calls to the identified prospective 3rd-party payer(s), and an interactive voice response (IVR) unit may be employed to communicate/interact with a called party to encourage the called 3rd party to establish a 3rd-party payment account. Of course, in other embodiments, the identified prospective 3rd-party payer(s) may be contacted in other ways, such as, via email, etc. Preferably, the campaign (e.g., contacting and communicating/interacting with the 3rd parties) is performed autonomously by the campaign system, as opposed to manually by a human user.
In view of the above, embodiments of the present invention enable prospective 3rd-party payer(s) to be identified for a resident and contacted to enable the prospective 3rd-party payer(s) to proactively establish 3rd-party payment accounts in anticipation of a future demand for service from the resident. Thus, when the resident makes a future demand for service, such service may be readily provided in an efficient manner for the resident if a 3rd-party payment account has been pre-established for the requested service.
It should be recognized that the resident of the CEF, as used herein, may refer to a current resident of the CEF or a future resident of the CEF (e.g., an expected or anticipated resident, such as a person under suspicion and/or being booked into a prison facility). Thus, when reference is made to capturing information about prospective 3rd party payer(s) and/or establishing 3rd-party payment accounts for a resident of a CEF, such tasks may, in some embodiments, be performed at a time prior to the resident actually becoming a resident of the CEF.
According to one exemplary embodiment, a system is provided that includes a 3rd-party payer identification system, a campaign system, and a service provision system. The 3rd-party payer identification system may include elements operable to detect the above-mentioned information-capture triggering event(s) and/or to determine the above-mentioned information about prospective 3rd-party payer(s) for a resident of a CEF. The campaign system may include elements operable to detect the above-mentioned campaign-triggering event(s), and in response to such detection proactively contact the identified prospective 3rd-party payer(s) to encourage them to establish 3rd-party payment accounts. Such campaign system may further include elements operable to interact with a contacted prospective 3rd-party payer to enable the 3rd-party payer to proactively establish a 3rd-party payment account. The service provision system may include elements operable to manage the rendering of service, such as telephony service, to a resident of a CEF. Thus, upon a resident of a CEF demanding service, the service provision system may manage the provision of such service to the resident, which may include determining that such service may be paid from a proactively-established 3rd-party payment account.
The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features and advantages of the invention will be described hereinafter which form the subject of the claims of the invention. It should be appreciated by those skilled in the art that the conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
As one example, the established 3rd-party payment accounts 109 can be used for payment for telephony services rendered to the resident 10 within the CEF. While embodiments of the present invention have particular application for use in establishing 3rd-party payment accounts 109 for payment for telephony services rendered to resident 10 of a CEF, the concepts presented herein are not limited to such application. For instance, certain embodiments may be additionally or alternatively applied for use in establishing 3rd-party payment accounts 109 for payment for other services rendered to resident 10 of a CEF, such as other communication services (e.g., email services, fax services, videoconferencing services, voicemail services, etc.), information retrieval services (e.g., Internet browsing services, etc.), provision of consumer goods (e.g., commissary items), etc. Indeed, embodiments of the present invention may be employed for establishing 3rd party payment accounts 109 which may be used for payment for any type of service rendered to resident 10 within CEF that requires payment. Of course, in certain embodiments, the established 3rd-party payment account 109 for a given 3rd-party may be restricted for use in paying for only certain types of services rendered to resident 10, such as for payment for communication services (e.g., telephone calls) between the resident 10 and such given 3rd-party.
Exemplary system 100 includes 3rd-party payer identification system 15, campaign system 16, and service provision system 17, which are discussed further below. While shown as separate elements in system 100 for ease of discussion, it should be understood that in certain embodiments one or more of the 3rd-party payer identification system 15, campaign system 16, and service provision system 17 (or portions thereof) may be integrated. Further, the 3rd-party payer identification system 15, campaign system 16, and service provision system 17 (or portions thereof) may be distributed and communicatively coupled together via a communication network, such as a local area network (LAN), the Internet or other wide area network (WAN), a wireless network, public-switched telephony network, any combination of the aforementioned and/or any other communication network now known or later developed that enables two or more computing devices to communicate. Further still, it will be appreciated from the further description herein that the exemplary components of 3rd-party payer identification system 15, campaign system 16, and service provision system 17 in
In this example, 3rd-party payer identification system 15 is operable to identify prospective 3rd-party payer(s) for a resident 10 of a CEF, such as 3rd-parties 12-14. As described further herein, such 3rd-party payer identification system 15 may determine certain information about identified prospective 3rd-party payer(s), such as contact information for such identified prospective 3rd-party payer(s). 3rd-party payer identification system 15 may store such information 104 identifying prospective 3rd-party payer(s), as well as determined contact information, etc., about the identified prospective 3rd-party payer(s), to a computer-readable medium, such as memory, hard drive, peripheral data storage drive, optical data storage (e.g., CD, DVD, etc.), magnetic data storage, tape storage, etc. Information 104 may be stored in the form of any suitable data structure, such as to a database, file, table, etc. Information 104 may include various information about prospective 3rd-party payer(s) for resident 10, such as the identity (e.g., name) of the prospective 3rd-party payer(s), and contact information for such prospective 3rd-party payer(s) (e.g., address, telephone number, email address, etc.).
3rd-party payer identification system 15 may determine information 104 through one or more of a variety of ways. As one example, in certain embodiments, information 104 is determined from prior-collected information 101, which may be stored to a computer-readable medium in the form of any suitable data structure. For instance, resident 10 may be a returning resident to a CEF, wherein information 101 may have been collected for resident 10 during a previous residency. For example, resident 10 may be a returning inmate of a prison. In today's society, recidivism in prison systems is very common. Of course, prior-collected information 101 may include information previously collected for resident 10 during a given residency in a CEF. For instance, prior-collected information 101 may include information collected upon resident 10 initially being checked into the CEF, and/or information collected over time about resident 10 during the resident's stay at the CEF. For example, upon an inmate being initially booked into a prison, information 101 about prospective 3rd-party payer(s) for the inmate may be collected. For instance, such information may be collected from the inmate about 3rd-party payer(s) whom the inmate expects may establish 3rd-party payment accounts 109 for payment for services rendered to the inmate while incarcerated. As another example, during the inmate's incarceration, information 101 about prospective 3rd-party payer(s) may be collected based, for instance, on those 3rd parties from whom the inmate communicates and/or receives visits and/or correspondence.
In certain embodiments, the 3rd-party payer information determined for a given resident of a CEF may be accessible for use across a plurality of different CEFs. For example, a plurality of prison facilities may share access to such information. Thus, for instance, prior-collected information 101 and/or other determined information (e.g., information 104) may be communicated to each of the plurality of different CEFs, and/or stored to a data storage medium that is accessible by each of the plurality of different CEFs. In certain embodiments, the various elements of system 100, such as the data storage medium(s) to which prior-collected information 101 and/or determined information 104 are stored and/or other elements of 3rd-party payer identification system 15, campaign system 16, payment accounts 109, and/or service provision system 17, may be implemented as part of a centralized platform that services a plurality of CEFs, such as the exemplary centralized call processing platform disclosed in co-pending and commonly assigned U.S. patent application Ser. No. 10/642,532 filed Aug. 15, 2003 titled “CENTRALIZED CALL PROCESSING,” the disclosure of which is incorporated herein by reference.
Another way in which information 104 may be determined in certain embodiments is by resident 10 interacting with a user 11 who enters such information into a computer system 102 for storage to a computer-readable medium in the form of any suitable data structure. For instance, upon a resident 10 arriving at a CEF, a user 11 may query the resident 10 for information about prospective 3rd-party payer(s) whom the resident 10 expects may establish 3rd-party payment accounts 109 for payment for services rendered to the resident 10 while in the CEF. For example, in instances in which resident 10 is an inmate in a prison, user 11 may be an officer who initially books the inmate into the prison, and during such booking may collect information 104 and enter the information into computer system 102.
Another way in which information 104 may be determined in certain embodiments is through resident 10 (or an associate/representative of such resident 10, such as a friend or family member of the resident 10) interacting directly with a computer system 103 to input such information 104 for storage to a computer-readable medium in the form of any suitable data structure. For instance, computer system 103 may be implemented as a kiosk with which resident 10 can interact to supply information 104 about prospective 3rd-party payer(s). As an example, any of the systems and techniques described in co-pending and commonly assigned U.S. patent application Ser. No. 11/480,259 filed Jun. 30, 2006 titled “SYSTEM AND METHOD FOR ELECTRONIC VISITATION REGISTRATION,” (the disclosure of which is incorporated herein by reference) for enabling a user to electronically register for visiting a resident of a CEF may additionally or alternatively be employed for enabling input of prospective 3rd-party payer information (e.g., by the resident, an associate, and even by the prospective 3rd-party payer himself). As a further example, any of the systems and techniques described in co-pending and commonly assigned U.S. patent application Ser. No. 11/125,842 filed May 10, 2005 titled “PROCESSOR-BASED SELF-SERVICE TERMINALS USED WITH RESPECT TO CONTROLLED ENVIRONMENT FACILITIES,” (the disclosure of which is incorporated herein by reference) may be employed for enabling input of prospective 3rd-party payer information (e.g., by the resident, an associate, and even by the prospective 3rd-party payer himself).
Exemplary system 100 also includes campaign system 16, which is operable to communicate with the identified prospective 3rd-party payer(s) to provide such prospective 3rd-party payer(s) an opportunity to establish 3rd-party payment accounts 109 for resident 10. In this example, campaign system 16 includes a 3rd-party payment account establishment system (“3rd-party PAES”) 110 that is operable to communicate with an identified prospective 3rd-party payer and provide such party an opportunity to establish a 3rd-party payment account 109 for resident 10. For instance, 3rd-party PAES 110 may use information 104 to determine prospective 3rd-party payer(s) that are identified for resident 10, as well as their respective contact information, and 3rd-party PAES 110 may attempt to contact the identified prospective 3rd-party payer(s) using their respective contact information 104. In certain embodiments, an automatic dialer 11 may be employed to place outbound telephone calls to the identified prospective 3rd-party payer(s), and an interactive voice response (IVR) unit 118 may be employed to communicate/interact with a called party. Of course, in other embodiments, the identified prospective 3rd-party payer(s) may be contacted in other ways, such as via email, etc.
Preferably, the campaign (e.g., contacting and communicating/interacting with the 3rd parties) is performed autonomously by 3rd-party PAES 110, as opposed to manually by a human user. Systems for autonomously contacting identified parties and communicating information to such parties (e.g., interacting with the parties) are well known in the art, and any such system now known or later developed may be employed by 3rd-party PAES 110 in accordance with certain embodiments of the present invention. For instance, automatic dialers 11 that are operable to place outbound telephone calls to identified numbers are known in the art. Further, IVR units 118 that are operable to communicate/interact with a called party are well-known in the art. Of course, in certain embodiments, the called parties may be transferred to a human operator for some or all of the communication/interaction instead of or in addition to using IVR 118 for such communication/interaction.
In the illustrated example of
In certain embodiments, a scoring system 119 may be included for use in determining a “risk score” for a 3rd party payer. Such risk score may be based on a variety of factors, such as the 3rd-party payer's credit score, payment history of the 3rd-party payer, the particular LEC used by the 3rd-party payer, the status of the resident for which the 3rd-party payer is paying for services (e.g., whether the resident is a long-term or a short-term resident of the CEF), etc. Exemplary systems and techniques for determining such a risk score are described in co-pending U.S. patent application Ser. No. 11/480,264 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT” filed Jun. 30, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 11/386,032 titled “SYSTEMS AND METHODS FOR ACCOUNT MANAGEMENT USING INTERRUPT MESSAGE” filed Mar. 21, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 10/360,248 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT USING INTERRUPT MESSAGING” filed Feb. 7, 2003, and/or as described in co-pending and commonly assigned U.S. patent applications: Ser. No. 10/360,442 filed Feb. 7, 2003 titled “SYSTEMS AND METHODS FOR TRANSACTION AUTHORIZATION DETERMINATION;” Ser. No. 11/386,056 filed Mar. 21, 2006 titled “MANAGEMENT OF PROVISION OF SERVICES BASED AT LEAST IN PART ON INFORMATION ABOUT A PAYOR'S UTILITY,” the disclosures of which are incorporated herein by reference.
In certain embodiments, an incentive may be offered to a 3rd party to proactively establish a 3rd-party payment account. For instance, various incentives may be employed to encourage a contacted prospective 3rd-party payer to proactively establish a 3rd-party payment account for the resident. In certain embodiments, a preferred account type may be determined (e.g., based at least in part on the 3rd party's risk score) and an incentive may be offered to the 3rd party to encourage the 3rd party to establish such preferred account type, rather than some other account type. In certain embodiments, an incentive may be offered to the 3rd party to proactively establish a 3rd-party payment account, wherein the 3rd party is informed that such incentive will not be available if the 3rd party waits until a later time to establish the 3rd-party payment account. Such incentives may, therefore, be used to encourage the 3rd party to proactively establish a 3rd-party payment account, which will advantageously reduce delays otherwise associated with the provision of service to the resident at the time the resident demands such service.
In other embodiments, the 3rd party may receive information and/or instructions from IVR 118 about how to establish a 3rd-party payment account 109. For instance, IVR 118 may communicate information about a triggering event 105 (discussed further below), such as information informing the 3rd party that resident 10 is now a resident of a given CEF (e.g., resident 10 is now an inmate of a given prison). IVR 118 may also provide the called party instructions about how to establish a 3rd-party payment account for resident 10. For example, IVR 118 may communicate a website (or other computer-accessible address) to the 3rd party, which the 3rd party may use to establish a payment account 109. For instance, in the example of
As mentioned above, such communication with a 3rd party may be performed in a manner other than telephony communication, such as via email, etc. Automatic email systems that are operable to generate outbound emails containing information to determined email addresses are known in the art, and such automatic email systems may be employed in certain embodiments to contact prospective 3rd-party payer(s) with information (e.g., that resident 10 is now a resident of a CEF, such as an inmate of a certain prison, and instructions regarding how to establish a 3rd-party payment account 109, such as by contacting 3rd-party payment account establish system 110 via telephone or via computer (such as computer 115), as examples) in a manner similar to that discussed above for the exemplary telephony communication. Thus, while
In certain embodiments, triggering event(s) 105 are defined, which trigger campaign system 16 to initiate a campaign to contact identified prospective 3rd-party payer(s) and encourage such 3rd-party payer(s) to proactively establish a 3rd-party payment account in anticipation of an expected upcoming demand for service by a resident of the CEF. In certain embodiments, a system administrator may define the triggering event(s) 105 as desired. For instance, in certain embodiments, a user interface is provided by campaign system 16, which enables a system administrator to define which triggering event(s) 105 are to trigger a campaign. The campaign-triggering event(s) 105 may be the same event that triggered the capture of the prospective 3rd-party payer information, as mentioned above, or it may be a different event. Examples of such campaign-triggering event(s) include the resident being identified as potentially becoming a resident of the CEF (e.g., a person becoming a person under suspicion of a crime and thus identified as potentially becoming an inmate of a prison), the resident being checked into the CEF (e.g., an inmate being booked into a prison facility), such as event 106 of
System 100 further includes a service provision system 17, which is operable to render one or more services to resident 10, wherein such services may be paid for via an established payment account 109. In the illustrated example, telephony services are provided to resident 10, and charges for such telephony services may be paid for via an established payment account 109. Of course, embodiments of the present invention are not limited in application to provision of telephony services, but may be additionally or alternatively applied for use in establishing 3rd-party payment accounts 109 for payment for other services rendered to resident 10 of a CEF, such as other communication services (e.g., email services, fax services, videoconferencing services, voicemail services, etc.), information retrieval services (e.g., Internet browsing services, etc.), provision of consumer goods (e.g., commissary items), etc. Indeed, embodiments of the present invention may be employed for establishing 3rd-party payment accounts 109 which may be used for payment for any type of service rendered to resident 10 within CEF that requires payment.
Service provision system 17 includes a service management system 108, which manages the provision of services, such as telephony services, etc., to resident 10. In the illustrated example, resident 10 uses telephone 116 to request a call to 3rd party 14. Service management system 108 may perform various operations to determine whether such requested call is to be permitted, including without limitation any one or more of determining whether the call is being placed during acceptable time periods in which residents of the CEF are allowed to place calls, whether the 3rd party 14 to which the call is being placed is not restricted from communication by the resident 10 (e.g., that 3rd party 14 is not a victim of a crime for which resident 10 is incarcerated in prison, etc.), and/or other operations. One operation that may be performed by service management system 10 is to determine how the call is to be paid for and/or the payment risk associated with completing the call (i.e., the risk of the call not being paid for). Thus, service management system 10 may determine whether a 3rd-party payment account 109 that can be used for payment for the requested call is established. Thus, for instance, if 3rd party 14 has pre-established a payment account 109 (e.g., a pre-funded account) prior to resident 10 requesting the call to such 3rd party 14 (e.g., as a result of campaign system 16 contacting the 3rd party 14), then such pre-established payment account 109 may be used for payment for the call, and thus service management system 108 may enable the requested call to be connected between resident 10 and 3rd party 14.
Turning now to
In certain embodiments, campaign-triggering event(s), such as the exemplary campaign triggering events 105 discussed above, may be detected in block 202 to trigger a campaign by campaign system 16. In block 203, campaign system 16 proactively contacts identified 3rd-party payer(s), prior to demand for service by the resident 10, to establish a 3rd-party payment account 109 for expected service to the resident 10. For instance, in the example illustrated in
In operational block 204, 3rd-party PAES 110 interacts with the contacted 3rd-party payer(s) to establish 3rd-party payment account(s) 109. As mentioned above, in certain embodiments, 3rd-party PAES 110 may offer incentives and/or otherwise encourage 3rd-party payer(s) to proactively establish 3rd-party payment account(s) 109.
In operational block 205, a demand for service is received from resident 10. In the illustrated example of
In operational block 32, resident 10 of a CEF is identified. That is, the resident 10 for whom a campaign is to be initiated is identified. The resident 10 may be identified as being a person identified as potentially becoming a resident of the CEF (e.g., becoming a person under suspicion of a crime and thus identified as potentially becoming an inmate of a prison), a person being checked into the CEF (e.g., an inmate being booked into a prison facility), or otherwise identified.
In operational block 33, 3rd-party payer identification system 15 proactively collects 3rd-party payment information 104 for resident 10 prior to an expected demand for service by the resident 10. Such proactive collection of information 104 in block 33 may include identifying prior-collected information 101 that is available for the identified resident 10, as shown in sub-block 301. Additionally or alternatively, such proactive collection of information 104 in block 33 may include collecting information 104 from the identified resident 10 (or an associate or representative of resident 10), as shown in sub-block 302, wherein the information may be collected by a user 11 and input to a computer 102 and/or input by the resident 10 (or an associate or representative of resident 10) to computer 103.
In block 402, 3rd-party PAES 110 identifies (e.g., from determined information 104) prospective 3rd-party payer(s) for the resident 10, such as 3rd-party payers 12-14 of
In block 404, 3rd-party PAES 110 initiates a campaign to proactively contact the determined ones of the identified 3rd-party payers. For instance, an automatic dialer 111 and IVR 118 may be used for proactively calling the identified 3rd-party payers 12-14, as shown in the example of
In block 405, 3rd-party PAES 110 provides information and/or instructions to the contacted 3rd-party payer(s). For example, in certain embodiments, an IVR 118 may communicate information about a triggering event 105, such as information informing the 3rd party that resident 10 is now a resident of a given CEF (e.g., resident 10 is now an inmate of a given prison). IVR 118 may also provide the called party an opportunity to establish a 3rd-party payment account for resident 10 and/or provide instructions to the called party about how to do so.
In block 406, 3rd-party PAES 110 may determine whether the contacted 3rd-party payer(s) desire to establish an account. For instance, IVR 118 may play a message to a called 3rd-party payer inquiring whether the called 3rd-party payer desires to establish a payment account for resident 10. If a response is received in the affirmative, 3rd-party PAES 110 may thus determine that the called 3rd-party payer desires to establish such a payment account.
In block 407, 3rd-party PAES 110 may determine a risk score for a contacted 3rd-party payer. As mentioned above, such risk score may be determined based on a number of factors, such as the 3rd-party payer's credit history, etc.
In block 408, 3rd-party PAES 110 may determine account type(s) for which the contacted 3rd-party payer qualifies and/or is preferred. As mentioned above, certain 3rd-party payment account types may be required or preferred by the service provider for a given 3rd-party payer (e.g., based on the 3rd-party payer's respective risk score).
In block 409, 3rd-party PAES 110 determines whether to offer an incentive to the contacted 3rd-party payer to establish a given type of account. As mentioned above, such an incentive may encourage the 3rd-party payer to proactively establish a 3rd-party payment account, and may be employed in certain embodiments to encourage the 3rd-party payer to proactively establish a preferred type of 3rd-party payment account.
In block 410, 3rd-party PAES 110 establishes a 3rd-party payment account 109 for the contacted 3rd-party payer for payment for services to be rendered to resident 10 within a CEF. In this manner, the 3rd-party payment account 109 is proactively established prior to an expected demand for service from a resident of a CEF.
When implemented in software, elements of the present invention are essentially the computer-executable software code for implementing such elements. The computer-executable software code can be stored to a computer-readable medium. The “computer-readable medium” may include any medium that can store information in a manner that can be read from a computing device, such as any processor-based computer. Examples of the computer-readable medium include an electronic circuit, a semiconductor memory device, a ROM, a flash memory, an erasable ROM (EROM), a floppy diskette, a compact disk CD-ROM, an optical disk, a hard disk, a fiber optic medium, etc. The exemplary operational flows of
Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods and steps described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
This application is a divisional of pending U.S. patent application Ser. No. 12/042,861, entitled “System and Method for Proactively Establishing a Third-Party Payment Account for Services Rendered to a Resident of a Controlled-Environment Facility,” filed Mar. 5, 2008, the disclosure of which is hereby incorporated herein by reference in its entirety. This application is related to co-pending U.S. patent application Ser. No. 11/480,264 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT” filed Jun. 30, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 11/386,032 titled “SYSTEMS AND METHODS FOR ACCOUNT MANAGEMENT USING INTERRUPT MESSAGE” filed Mar. 21, 2006, which is a continuation-in-part of co-pending U.S. patent application Ser. No. 10/360,248 titled “SYSTEMS AND METHODS FOR ACCOUNT ESTABLISHMENT AND TRANSACTION MANAGEMENT USING INTERRUPT MESSAGING” filed Feb. 7, 2003, the disclosures of which are hereby incorporated herein by reference. The present application is also related to co-pending and commonly assigned U.S. patent applications: Ser. No. 10/360,442 filed Feb. 7, 2003 titled “SYSTEMS AND METHODS FOR TRANSACTION AUTHORIZATION DETERMINATION;” Ser. No. 10/135,883 (now Published Application No. 2002/0194096) filed Apr. 29, 2002 titled “OPTIMIZING PROFITABILITY IN BUSINESS TRANSACTIONS;” Ser. No. 10/135,878 filed Apr. 29, 2002 titled “INFORMATION MANAGEMENT AND MOVEMENT SYSTEM AND METHOD;” Ser. No. 11/386,056 filed Mar. 21, 2006 titled “MANAGEMENT OF PROVISION OF SERVICES BASED AT LEAST IN PART ON INFORMATION ABOUT A PAYOR'S UTILITY;” Ser. No. 11/480,259 filed Jun. 30, 2006 titled “SYSTEM AND METHOD FOR ELECTRONIC VISITATION REGISTRATION;” Ser. No. 10/720,732 filed Nov. 24, 2003 titled “INFORMATION MANAGEMENT AND MOVEMENT SYSTEM AND METHOD;” Ser. No. 10/720,858 filed Nov. 24, 2003 titled “INFORMATION MANAGEMENT AND MOVEMENT SYSTEM AND METHOD;” Ser. No. 11/125,842 filed May 10, 2005 titled “PROCESSOR-BASED SELF-SERVICE TERMINALS USED WITH RESPECT TO CONTROLLED ENVIRONMENT FACILITIES;” Ser. No. 10/642,532 filed Aug. 15, 2003 titled “CENTRALIZED CALL PROCESSING;” Ser. No. 10/800,473 filed Mar. 15, 2004 titled “CALL PROCESSING WITH VOICE OVER INTERNET PROTOCOL TRANSMISSION;” Ser. No. 10/602,233 filed Jun. 24, 2003 titled “SYSTEMS AND METHODS FOR TRANSACTION AND INFORMATION MANAGEMENT;” and Ser. No. 10/836,976 filed Apr. 30, 2004 titled “SYSTEMS AND METHODS FOR TRANSACTION AND INFORMATION MANAGEMENT,” the disclosures of which are hereby incorporated herein by reference. The present application is also related to commonly assigned U.S. Pat. No. 6,639,978 titled “Method for Determining an Entity Responsible for Billing a Called Party,” which issued from an application filed Dec. 17, 2001, the disclosure of which is also hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
3096404 | Semon | Jul 1963 | A |
3113185 | Semon | Dec 1963 | A |
3350515 | Semon | Oct 1967 | A |
3397288 | Semon | Aug 1968 | A |
3398288 | Sanders et al. | Aug 1968 | A |
3626107 | Armstrong et al. | Dec 1971 | A |
3660610 | Hestad et al. | May 1972 | A |
3676605 | Johnson | Jul 1972 | A |
3798382 | Hoven | Mar 1974 | A |
3813495 | Conerly | May 1974 | A |
3829617 | Caithamer et al. | Aug 1974 | A |
3851121 | Marvin | Nov 1974 | A |
3864519 | Owen | Feb 1975 | A |
3952160 | Pastemack et al. | Apr 1976 | A |
3985956 | Monti et al. | Oct 1976 | A |
3997731 | Wilmot et al. | Dec 1976 | A |
4001513 | Naylor | Jan 1977 | A |
4002848 | Stein | Jan 1977 | A |
4027109 | Smith et al. | May 1977 | A |
4054756 | Comella et al. | Oct 1977 | A |
4055730 | Stapleford et al. | Oct 1977 | A |
4122308 | Weinberger et al. | Oct 1978 | A |
4156799 | Cave | May 1979 | A |
4188508 | Rogers et al. | Feb 1980 | A |
4196317 | Bartelink | Apr 1980 | A |
4310726 | Asmuth | Jan 1982 | A |
4319091 | Meri | Mar 1982 | A |
4326123 | Hosterman | Apr 1982 | A |
4333056 | Cave | Jun 1982 | A |
4371752 | Matthews et al. | Feb 1983 | A |
4387274 | Stein et al. | Jun 1983 | A |
4405833 | Cave et al. | Sep 1983 | A |
4439636 | Newkirk et al. | Mar 1984 | A |
4445211 | Webber | Apr 1984 | A |
4477698 | Szlam et al. | Oct 1984 | A |
4518825 | Brinkerhoff et al. | May 1985 | A |
4538030 | Fossett et al. | Aug 1985 | A |
4540855 | Szlam et al. | Sep 1985 | A |
4552996 | de Bergh | Nov 1985 | A |
4559416 | Theis et al. | Dec 1985 | A |
4585904 | Mincone et al. | Apr 1986 | A |
4593157 | Usdan | Jun 1986 | A |
4595983 | Gehalo et al. | Jun 1986 | A |
4602129 | Matthews et al. | Jul 1986 | A |
4626630 | Waldman | Dec 1986 | A |
4629829 | Puhl et al. | Dec 1986 | A |
4644109 | Takeda et al. | Feb 1987 | A |
4686699 | Wilkie | Aug 1987 | A |
4696028 | Morganstein et al. | Sep 1987 | A |
4696031 | Freudberg et al. | Sep 1987 | A |
4698840 | Dively et al. | Oct 1987 | A |
4712230 | Rice et al. | Dec 1987 | A |
4723273 | Diesel et al. | Feb 1988 | A |
4726057 | Doerry et al. | Feb 1988 | A |
4727577 | Frey et al. | Feb 1988 | A |
4731818 | Clark, Jr. et al. | Mar 1988 | A |
4736405 | Akiyama | Apr 1988 | A |
4737982 | Boratgis et al. | Apr 1988 | A |
4746786 | Heberle et al. | May 1988 | A |
4763350 | Immendorfer et al. | Aug 1988 | A |
4766604 | Axberg | Aug 1988 | A |
4768223 | Kinoshita et al. | Aug 1988 | A |
4768227 | Dively et al. | Aug 1988 | A |
4769834 | Billinger et al. | Sep 1988 | A |
4777647 | Smith et al. | Oct 1988 | A |
4782516 | Maybach et al. | Nov 1988 | A |
4791640 | Sand | Dec 1988 | A |
4794642 | Arbabzadah et al. | Dec 1988 | A |
4797910 | Daudelin | Jan 1989 | A |
4799255 | Billinger et al. | Jan 1989 | A |
4802207 | Uchida | Jan 1989 | A |
4803718 | Neil et al. | Feb 1989 | A |
4815120 | Kosich | Mar 1989 | A |
4825460 | Carter et al. | Apr 1989 | A |
4839917 | Oliver | Jun 1989 | A |
4850011 | Delmege et al. | Jul 1989 | A |
4868873 | Kamil | Sep 1989 | A |
4885765 | Shirakawa | Dec 1989 | A |
4890317 | Hird et al. | Dec 1989 | A |
4896348 | Grantland et al. | Jan 1990 | A |
4899358 | Blakley | Feb 1990 | A |
4899375 | Bauer et al. | Feb 1990 | A |
4901341 | Carter et al. | Feb 1990 | A |
4908852 | Hird et al. | Mar 1990 | A |
4916733 | Smith et al. | Apr 1990 | A |
4920562 | Hird et al. | Apr 1990 | A |
4922519 | Daudelin | May 1990 | A |
4922520 | Bernard et al. | May 1990 | A |
4924488 | Kosich | May 1990 | A |
4924501 | Cheeseman et al. | May 1990 | A |
4932062 | Hamilton | Jun 1990 | A |
4933966 | Hird et al. | Jun 1990 | A |
4933967 | Lo et al. | Jun 1990 | A |
4935956 | Hellwarth et al. | Jun 1990 | A |
4937856 | Natarajan | Jun 1990 | A |
4937862 | Kosich | Jun 1990 | A |
4943995 | Daudelin et al. | Jul 1990 | A |
4944001 | Kizuik et al. | Jul 1990 | A |
4947422 | Smith et al. | Aug 1990 | A |
4947425 | Grizmala et al. | Aug 1990 | A |
4979214 | Hamilton | Dec 1990 | A |
4991203 | Kakizawa | Feb 1991 | A |
4993062 | Dula et al. | Feb 1991 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5003595 | Collins et al. | Mar 1991 | A |
5008923 | Kitamura et al. | Apr 1991 | A |
5020095 | Morganstein et al. | May 1991 | A |
5022067 | Hughes | Jun 1991 | A |
5023869 | Grover et al. | Jun 1991 | A |
5023906 | Novas | Jun 1991 | A |
5033088 | Shipman | Jul 1991 | A |
5054059 | Stern et al. | Oct 1991 | A |
5063593 | Kwon | Nov 1991 | A |
5093858 | Hird et al. | Mar 1992 | A |
5109405 | Morganstein | Apr 1992 | A |
5131024 | Pugh et al. | Jul 1992 | A |
5134651 | Ortiz et al. | Jul 1992 | A |
5150357 | Hopner et al. | Sep 1992 | A |
5153907 | Pugh et al. | Oct 1992 | A |
5155761 | Hammond | Oct 1992 | A |
5163083 | Dowden et al. | Nov 1992 | A |
5164989 | Brandman et al. | Nov 1992 | A |
5181237 | Dowden et al. | Jan 1993 | A |
5185781 | Dowden et al. | Feb 1993 | A |
5187740 | Swaim et al. | Feb 1993 | A |
5193110 | Jones et al. | Mar 1993 | A |
5200995 | Gaukel et al. | Apr 1993 | A |
5210789 | Jeffus et al. | May 1993 | A |
5216702 | Ramsden | Jun 1993 | A |
5218636 | Hamilton | Jun 1993 | A |
5220501 | Lawlor et al. | Jun 1993 | A |
5222120 | McLeod et al. | Jun 1993 | A |
5229764 | Matchett et al. | Jul 1993 | A |
5247569 | Cave | Sep 1993 | A |
5255305 | Sattar | Oct 1993 | A |
5274698 | Jang | Dec 1993 | A |
5276731 | Arbel et al. | Jan 1994 | A |
5283825 | Druckman et al. | Feb 1994 | A |
5287401 | Lin | Feb 1994 | A |
5305312 | Fornek et al. | Apr 1994 | A |
5309505 | Szlam et al. | May 1994 | A |
5311589 | Bennett et al. | May 1994 | A |
5319701 | Hird et al. | Jun 1994 | A |
5319702 | Kitchin et al. | Jun 1994 | A |
5321754 | Fisher et al. | Jun 1994 | A |
5323448 | Biggs et al. | Jun 1994 | A |
5325421 | Hou et al. | Jun 1994 | A |
5325427 | Dighe | Jun 1994 | A |
5327489 | Anderson et al. | Jul 1994 | A |
5329578 | Brennan et al. | Jul 1994 | A |
5333181 | Biggs | Jul 1994 | A |
5335266 | Richardson, Jr. et al. | Aug 1994 | A |
5345501 | Shelton | Sep 1994 | A |
5345595 | Johnson et al. | Sep 1994 | A |
5351285 | Katz | Sep 1994 | A |
5351287 | Bhattacharyya et al. | Sep 1994 | A |
5355403 | Richardson, Jr. et al. | Oct 1994 | A |
5369699 | Page et al. | Nov 1994 | A |
5375161 | Fuller et al. | Dec 1994 | A |
5381474 | Lahdemaki et al. | Jan 1995 | A |
5394465 | Jo | Feb 1995 | A |
5416831 | Chewning, III et al. | May 1995 | A |
5425087 | Gerber et al. | Jun 1995 | A |
5428662 | Hamilton | Jun 1995 | A |
5442696 | Lindberg et al. | Aug 1995 | A |
5450485 | Hamilton | Sep 1995 | A |
5452347 | Iglehart et al. | Sep 1995 | A |
5455819 | Sugiyama | Oct 1995 | A |
5461665 | Shur et al. | Oct 1995 | A |
5465293 | Chiller et al. | Nov 1995 | A |
5465387 | Mukherjee | Nov 1995 | A |
5471519 | Howe et al. | Nov 1995 | A |
5473686 | Virdee | Dec 1995 | A |
5483582 | Pugh et al. | Jan 1996 | A |
5483593 | Gupta et al. | Jan 1996 | A |
5485507 | Brown et al. | Jan 1996 | A |
5497414 | Bartholomew | Mar 1996 | A |
5504810 | McNair | Apr 1996 | A |
5517555 | Amadon et al. | May 1996 | A |
5524141 | Braun et al. | Jun 1996 | A |
5524145 | Parker | Jun 1996 | A |
5535261 | Brown et al. | Jul 1996 | A |
5539812 | Kitchin et al. | Jul 1996 | A |
5544231 | Cho | Aug 1996 | A |
5566229 | Hou et al. | Oct 1996 | A |
5577116 | Townsend et al. | Nov 1996 | A |
5583920 | Wheeler, Jr. | Dec 1996 | A |
5583934 | Zhou | Dec 1996 | A |
5606604 | Rosenblatt et al. | Feb 1997 | A |
5615408 | Johnson et al. | Mar 1997 | A |
5617471 | Rogers et al. | Apr 1997 | A |
5619561 | Reese | Apr 1997 | A |
5627887 | Freedman | May 1997 | A |
5634126 | Norell | May 1997 | A |
5651056 | Eting et al. | Jul 1997 | A |
5655013 | Gainsboro | Aug 1997 | A |
5682386 | Arimilli et al. | Oct 1997 | A |
5722418 | Bro | Mar 1998 | A |
5724404 | Garcia et al. | Mar 1998 | A |
5742905 | Pepe et al. | Apr 1998 | A |
5745553 | Mirville et al. | Apr 1998 | A |
5745558 | Richardson, Jr. et al. | Apr 1998 | A |
5757781 | Gilman et al. | May 1998 | A |
5768355 | Salibrici et al. | Jun 1998 | A |
5777558 | Pennypacker et al. | Jul 1998 | A |
5796811 | McFarlen | Aug 1998 | A |
5799068 | Kikinis et al. | Aug 1998 | A |
5805685 | McFarlen | Sep 1998 | A |
5809125 | Gammino | Sep 1998 | A |
5832068 | Smith | Nov 1998 | A |
5844978 | Reuss et al. | Dec 1998 | A |
5859902 | Freedman | Jan 1999 | A |
5859907 | Kawahara et al. | Jan 1999 | A |
5861810 | Nguyen | Jan 1999 | A |
5862519 | Sharma et al. | Jan 1999 | A |
5867559 | Jorgensen et al. | Feb 1999 | A |
5875230 | Ganley et al. | Feb 1999 | A |
5875236 | Jankowitz et al. | Feb 1999 | A |
5883945 | Richardson, Jr. et al. | Mar 1999 | A |
5894511 | Jordan | Apr 1999 | A |
5907602 | Peel et al. | May 1999 | A |
5915001 | Uppaluru | Jun 1999 | A |
5923746 | Baker et al. | Jul 1999 | A |
5926533 | Gainsboro | Jul 1999 | A |
5937035 | Andruska et al. | Aug 1999 | A |
5937042 | Sofman | Aug 1999 | A |
5937044 | Kim | Aug 1999 | A |
5943403 | Richardson, Jr. et al. | Aug 1999 | A |
5946386 | Rogers et al. | Aug 1999 | A |
5960064 | Foladare et al. | Sep 1999 | A |
5963625 | Kawecki et al. | Oct 1999 | A |
5963635 | Szlam | Oct 1999 | A |
5991373 | Pattison et al. | Nov 1999 | A |
6031895 | Cohn et al. | Feb 2000 | A |
6038315 | Strait et al. | Mar 2000 | A |
6052454 | Kek et al. | Apr 2000 | A |
6058163 | Pattison et al. | May 2000 | A |
6064963 | Gainsboro | May 2000 | A |
6072860 | Kek | Jun 2000 | A |
6075843 | Cave | Jun 2000 | A |
6078892 | Anderson et al. | Jun 2000 | A |
6097804 | Gilbert et al. | Aug 2000 | A |
6108642 | Findley | Aug 2000 | A |
6118860 | Hillson et al. | Sep 2000 | A |
6134320 | Swan et al. | Oct 2000 | A |
6141406 | Johnson | Oct 2000 | A |
6167256 | Yla-Outinen et al. | Dec 2000 | A |
6169789 | Rao et al. | Jan 2001 | B1 |
6173284 | Brown | Jan 2001 | B1 |
6175831 | Weinreich et al. | Jan 2001 | B1 |
RE37073 | Hammond | Feb 2001 | E |
6188751 | Scherer | Feb 2001 | B1 |
6249570 | Glowny et al. | Jun 2001 | B1 |
6282276 | Felger | Aug 2001 | B1 |
6308171 | De La Huerga | Oct 2001 | B1 |
6320946 | Enzmann et al. | Nov 2001 | B1 |
6320948 | Heilmann et al. | Nov 2001 | B1 |
6324280 | Dunn et al. | Nov 2001 | B2 |
6327345 | Jordan | Dec 2001 | B1 |
6330546 | Gopinathan et al. | Dec 2001 | B1 |
6353663 | Stevens et al. | Mar 2002 | B1 |
6363065 | Thornton et al. | Mar 2002 | B1 |
6366653 | Yeh et al. | Apr 2002 | B1 |
6377938 | Block et al. | Apr 2002 | B1 |
6381321 | Brown et al. | Apr 2002 | B1 |
6396915 | Springer et al. | May 2002 | B1 |
6397055 | McHenry et al. | May 2002 | B1 |
6404764 | Jones et al. | Jun 2002 | B1 |
6404857 | Blair et al. | Jun 2002 | B1 |
6404870 | Kia | Jun 2002 | B1 |
6405028 | DePaola et al. | Jun 2002 | B1 |
6430274 | Winstead et al. | Aug 2002 | B1 |
6434378 | Fougnies | Aug 2002 | B1 |
6445682 | Weitz | Sep 2002 | B1 |
6478245 | Azai | Nov 2002 | B2 |
6480590 | Ku | Nov 2002 | B1 |
6483910 | Council | Nov 2002 | B1 |
6487200 | Fraser | Nov 2002 | B1 |
6496477 | Perkins et al. | Dec 2002 | B1 |
6513119 | Wenzel | Jan 2003 | B1 |
6516056 | Justice et al. | Feb 2003 | B1 |
6529500 | Pandharipande | Mar 2003 | B1 |
6529602 | Walker et al. | Mar 2003 | B1 |
6553336 | Johnson et al. | Apr 2003 | B1 |
6560323 | Gainsboro | May 2003 | B2 |
6560325 | Brown et al. | May 2003 | B2 |
6611583 | Gainsboro | Aug 2003 | B1 |
6621812 | Chapman et al. | Sep 2003 | B1 |
6636591 | Swope et al. | Oct 2003 | B1 |
6639977 | Swope et al. | Oct 2003 | B1 |
6639978 | Draizin et al. | Oct 2003 | B2 |
6654722 | Aldous et al. | Nov 2003 | B1 |
6658393 | Basch et al. | Dec 2003 | B1 |
6665376 | Brown | Dec 2003 | B1 |
6665380 | Cree et al. | Dec 2003 | B1 |
6668045 | Mow | Dec 2003 | B1 |
6687360 | Kung et al. | Feb 2004 | B2 |
6688518 | Valencia et al. | Feb 2004 | B1 |
6731630 | Schuster et al. | May 2004 | B1 |
6768792 | Brown et al. | Jul 2004 | B2 |
6782370 | Stack | Aug 2004 | B1 |
6788775 | Simpson | Sep 2004 | B1 |
6795444 | Vo et al. | Sep 2004 | B1 |
6816469 | Kung et al. | Nov 2004 | B1 |
6836540 | Falcone et al. | Dec 2004 | B2 |
6845152 | Taff et al. | Jan 2005 | B2 |
6876647 | Celi, Jr. | Apr 2005 | B2 |
6904139 | Brown et al. | Jun 2005 | B2 |
6920209 | Gainsboro | Jul 2005 | B1 |
6947525 | Benco | Sep 2005 | B2 |
6947532 | Marchand et al. | Sep 2005 | B1 |
6976032 | Hull et al. | Dec 2005 | B1 |
6985478 | Pogossiants et al. | Jan 2006 | B2 |
7039171 | Gickler | May 2006 | B2 |
7042992 | Falcone | May 2006 | B1 |
7075919 | Wendt et al. | Jul 2006 | B1 |
7075922 | Mussman et al. | Jul 2006 | B2 |
7079636 | McNitt et al. | Jul 2006 | B1 |
7079637 | McNitt et al. | Jul 2006 | B1 |
7046782 | Miller | Aug 2006 | B2 |
7085359 | Crites et al. | Aug 2006 | B2 |
7106843 | Gainsboro | Sep 2006 | B1 |
7124438 | Judge et al. | Oct 2006 | B2 |
7133845 | Ginter et al. | Nov 2006 | B1 |
7158621 | Bayne | Jan 2007 | B2 |
7188360 | Gerdes et al. | Mar 2007 | B2 |
7203186 | Fuller et al. | Apr 2007 | B1 |
7203301 | Mudd et al. | Apr 2007 | B1 |
7256816 | Profanchick et al. | Aug 2007 | B2 |
7302053 | Chang et al. | Nov 2007 | B2 |
7333798 | Hodge | Feb 2008 | B2 |
7360087 | Jorgensen et al. | Apr 2008 | B2 |
7360090 | Doskow et al. | Apr 2008 | B1 |
7372949 | Kurth et al. | May 2008 | B1 |
7376622 | Padalino | May 2008 | B1 |
7377426 | Makeever | May 2008 | B1 |
7466816 | Blair | Dec 2008 | B2 |
7492881 | Hite | Feb 2009 | B1 |
7505406 | Spadaro et al. | Mar 2009 | B1 |
7529357 | Rae et al. | May 2009 | B1 |
7698182 | Falcone et al. | Apr 2010 | B2 |
7860226 | Falcone et al. | Dec 2010 | B1 |
7899167 | Rae | Mar 2011 | B1 |
7916845 | Rae et al. | Mar 2011 | B2 |
7961858 | Polozola et al. | Jun 2011 | B2 |
8000269 | Rae et al. | Aug 2011 | B1 |
8180027 | Magnuson | May 2012 | B1 |
20010028649 | Pogossiants et al. | Oct 2001 | A1 |
20010028705 | Adams et al. | Oct 2001 | A1 |
20010036821 | Silberfenig et al. | Nov 2001 | A1 |
20010041590 | Gainsboro | Nov 2001 | A1 |
20010043697 | Cox et al. | Nov 2001 | A1 |
20010047333 | Kim et al. | Nov 2001 | A1 |
20020025028 | Manto | Feb 2002 | A1 |
20020067272 | Lemelson et al. | Jun 2002 | A1 |
20020069084 | Donovan | Jun 2002 | A1 |
20020071537 | Gainsboro | Jun 2002 | A1 |
20020106065 | Joyce et al. | Aug 2002 | A1 |
20020107871 | Wyzga et al. | Aug 2002 | A1 |
20020115424 | Bagoren et al. | Aug 2002 | A1 |
20020136374 | Fleischer, III et al. | Sep 2002 | A1 |
20020141386 | Minert et al. | Oct 2002 | A1 |
20020147002 | Trop et al. | Oct 2002 | A1 |
20020147707 | Kraay et al. | Oct 2002 | A1 |
20020159440 | Mussman et al. | Oct 2002 | A1 |
20020176403 | Radian | Nov 2002 | A1 |
20020184103 | Shah et al. | Dec 2002 | A1 |
20020191762 | Benson | Dec 2002 | A1 |
20020194096 | Falcone | Dec 2002 | A1 |
20020194113 | Lof et al. | Dec 2002 | A1 |
20030002639 | Huie | Jan 2003 | A1 |
20030008634 | Laybourn et al. | Jan 2003 | A1 |
20030023714 | Ziegler et al. | Jan 2003 | A1 |
20030023874 | Prokupets et al. | Jan 2003 | A1 |
20030026462 | Chung | Feb 2003 | A1 |
20030041050 | Smith | Feb 2003 | A1 |
20030046208 | Lubking et al. | Mar 2003 | A1 |
20030070076 | Michael | Apr 2003 | A1 |
20030076940 | Manto | Apr 2003 | A1 |
20030086546 | Falcone | May 2003 | A1 |
20030091028 | Chang et al. | May 2003 | A1 |
20030093533 | Ezerzer et al. | May 2003 | A1 |
20030099337 | Lord | May 2003 | A1 |
20030112936 | Brown et al. | Jun 2003 | A1 |
20030126470 | Crites et al. | Jul 2003 | A1 |
20030133558 | Kung et al. | Jul 2003 | A1 |
20030138084 | Lynam et al. | Jul 2003 | A1 |
20030151761 | Burns | Aug 2003 | A1 |
20030162526 | Ogman et al. | Aug 2003 | A1 |
20030174826 | Hesse | Sep 2003 | A1 |
20030185204 | Murdock | Oct 2003 | A1 |
20030190045 | Huberman et al. | Oct 2003 | A1 |
20030200182 | Truitt et al. | Oct 2003 | A1 |
20040029564 | Hodge | Feb 2004 | A1 |
20040052218 | Knappe | Mar 2004 | A1 |
20040078328 | Talbert et al. | Apr 2004 | A1 |
20040161086 | Buntin et al. | Aug 2004 | A1 |
20040229569 | Franz | Nov 2004 | A1 |
20050027723 | Jones et al. | Feb 2005 | A1 |
20050092835 | Chung | May 2005 | A1 |
20050114192 | Tor et al. | May 2005 | A1 |
20050125321 | Gerstner | Jun 2005 | A1 |
20050141678 | Anders | Jun 2005 | A1 |
20050170818 | Netanel et al. | Aug 2005 | A1 |
20050284931 | Adams et al. | Dec 2005 | A1 |
20060209797 | Anisimov et al. | Sep 2006 | A1 |
20060252999 | Devaul | Nov 2006 | A1 |
20060261939 | Blakeway | Nov 2006 | A1 |
20060282021 | DeVaul | Dec 2006 | A1 |
20060285650 | Hodge | Dec 2006 | A1 |
20060286962 | Davis | Dec 2006 | A1 |
20070041535 | Forrest, II | Feb 2007 | A1 |
20070041545 | Gainsboro | Feb 2007 | A1 |
20070071206 | Gainsboro | Mar 2007 | A1 |
20071011592 | Schneider et al. | May 2007 | |
20070242658 | Rae et al. | Oct 2007 | A1 |
20070263812 | Palazola et al. | Nov 2007 | A1 |
20080040780 | Reinhold | Feb 2008 | A1 |
20080140491 | Jain | Jun 2008 | A1 |
20090170604 | Mueller | Jul 2009 | A1 |
20110015943 | Keldie | Jan 2011 | A1 |
Number | Date | Country |
---|---|---|
0185365 | Jun 1986 | EP |
0814583 | Dec 1997 | EP |
1 175 074 | Jan 2002 | EP |
2600850 | Dec 1987 | FR |
2134749 | Aug 1984 | GB |
5-30193 | Feb 1993 | JP |
63-03305 | Oct 1994 | JP |
63-033054 | Dec 1994 | JP |
8077479 | Mar 1996 | JP |
2002-157627 | May 2002 | JP |
2003-110758 | Apr 2003 | JP |
9620448 | Jul 1996 | WO |
9722208 | Jun 1997 | WO |
9813993 | Apr 1998 | WO |
9823062 | May 1998 | WO |
0054491 | Sep 2000 | WO |
03052741 | Jun 2003 | WO |
Entry |
---|
Federal Prisoner Health Care Copayment Act of 2000, House of Representatives Report 106-851, 106th Congress 2d Session, Sep. 14, 2000, 26 pages. |
European Search Report for European Patent Application No. 07252651.0, dated Apr. 4, 2008, 6 pages. |
International Search Report and Written Opinion of the International Searching Authority for International Application No. PCT/US07/72558, dated Jun. 17, 2008, 7 pages. |
IMAGIS Technologies, Inc., “Computerized Arrest and Booking System,” http://www.imagistechnologies.com/Product/CABS.htm, Nov. 5, 2002, 5 pages. |
IMAGIS Technologies, Inc. “Integrated Justice System-Web based Image and Data Sharing,” http://www.imagistechnologies.com/Product/IJISFramework.htm, Nov. 5, 2002, 4 pages. |
i2 Investigative Analysis Software; “ChartReader,” URL: http://www.i2.co.uk/Products Chart Reader/, Jun. 13, 2005, 1 page. |
i2 Investigative Analysis Software; “iBase-Information Captured,” URL: http://www.i2.co.uk/Products/iBase/, Jun. 13, 2005, 2 pages. |
i2 Investigative Analysis Software; “iBridge,” URL: http://www.i2.co.uk/Products/iBridge/. Jun. 13, 2005, 1 page. |
i2 Investigative Analysis Software; “i2 TextChart:Text Visualized,” URL: http://www.i2.co.uk/Products/i2TextChart/. Jun. 13, 2005, 2 pages. |
i2 Investigative Analysis Software; “Pattern Tracer,” URL: http://www.i2.co.uk/Products/Pattern Tracer/. Jun. 13, 2005, 1 page. |
i2 Investigative Analysis Software; “Prisons,” URL: http://www.i2.co.uk/Solutions/Prisons/default.asap. Jun. 13, 2005, 1 page. |
i2 Investigative Analysis Software; “Setting International Standards for Investigative Analysis,” URL: http://www.i2.co.uk/Products/index.htm, Jun. 13, 2005, 1 page. |
Microsoft: “Integrated Justice Information Systems (IJIS): An Overview,” Microsoft Justice & Public Safety Solutions Nov. 5, 2002 http://jps.directtaps.net/_vti_bin/owssvr.dll?Using=Default%2ehtm, 22 pages. |
O'Harrow, R., Jr., “Database will make tracking suspected terrorists easier,” The Dallas Morning News, Dallas, TX, Aug. 6, 2003. p. 7A. |
O'Harrow, R., Jr.,“U.S. Backs Florida's New Counterterrorism Database; ‘Matrix’ Offers Law Angencies Faster Access to Americans' Personal Records:[Final Edition],” The Washington Post, Washington, D.C., Aug. 6, 2003, p. A. 01. |
Chaum., et al., “Building an Infrastucture for Law Enforcement Information Sharing and Collaboration: Design Issues and Challenges,” 2001, 6 pages. |
Hauck, R.V., et al., “Coplink: A Case of Intelligent Analysis and Knowledge Management,” Dec. 1999, pp. 15-29. |
Fischer, A.O., et al., “COPLINK nabs criminals faster,” Arizona Daily Star, Jan. 7, 2001, pp. 1-5. |
“BubbleLINK® Software Architecture,” SciDyn™, The Voice of IP Technology™, Nov. 4, 2005, 10 pages, http://www.scidyn.com/products/Bubblelink%20White.pdf. |
“Call Control-Commander II:,” SciDyn™ Products, Nov. 4, 2005, 3 pages, http://www.scidyn .com/products/com mander2.html. |
“ShoreTel—Intelligent Phone Systems,” ShoreTel, Nov. 4, 2005, 4 pages, http://www.shoretel.com/STCorp/products/architecture.aspx. |
“SciDyn VoIP Technology Now Available for Call Control Solutions,” SciDyn™ Press Release, Nov. 4, 2005, 2 pages. |
“Smart Features for Opimizing Your Network,” SciDyn™ BubbleLINK®, Nov. 4, 2005, 2 pages, http://www.scidyn.com/products/bubble.html. |
Swope, B., et al., U.S. Appl. No. 09/640,831, “System and Method for Reverse Billing for Telephone Call,” Aug. 17, 2000. |
Lord, M., U.S. Appl. No. 09/995,253, “Method and Apparatus for Exchanging Data Between a Primary Computer System and an External Computer System to Ensure Transactional Reconciliation Between the Systems,” Nov. 27, 2001. |
Draizin, N., et al., U.S. Appl. No. 10/022,946, “A Method for Determining an Entity Responsible for Billing a Called Party,” Dec. 17, 2001. |
Viola, J., et al., U.S. Appl. No. 10/135,878, “Information Management and Movement System and Method,” Apr. 29, 2002. |
Falcone, R., et al., U.S. Appl. No. 10/135,883, “Optimizing Profitability in Business Transactions,” Filed Apr. 29, 2002. |
Falcone, R.,et al., U.S. Appl. No. 10/190,315, “Systems and Methods for Offering a Service to a Party Associated with a Blocked Call,” Jul. 3, 2002. |
Mudd, R., et al., U.S. Appl. No. 10/217,149, “System and Method of Call Treatment,” Aug. 12, 2002. |
Lord, M., U.S. Appl. No. 10/252,956, “Three-Way Telephone Call Prevention System and Method,” Sep. 20, 2002. |
Falcone, R., et al., U.S. Appl. No. 10/360,248, “Systems and Methods for Account Establishment and Transaction Management Using Interrupt Messaging,” Feb. 7, 2003. |
Falcone, R., et al., U.S. Appl. No. 10/360,442, “Systems and Methods for Transaction Authorization Determination,” Feb. 7, 2003. |
Hite, M., et al., U.S. Appl. No. 10/437,839,“Intelligent Queuing of Transaction Records,” May 14, 2003, (Reference not included). |
Sullivan, R. et al., U.S. Appl. No. 10/602,233,“Systems and Methods for Transaction and Information Management,” Jun. 24, 2003. |
Rae, R., U.S. Appl. No. 10/642,532, “Centralized Call Processing,” Aug. 15, 2003. |
Viola, J.,et al., U.S. Appl. No. 10/720,732, “Information Management and Movement System and Method,” Nov. 24, 2003. |
Viola, J., et al., U.S. Appl. No. 10/720,848, “Information Management and Movement System and Method,” Nov. 24, 2003. |
Rae, et al., U.S. Appl. No. 10/800,473, “Centralized Call Processing,” Mar. 15, 2004. |
Rosenfield, S., et al., U.S. Appl. No. 10/836,976, “Systems and Methods for Transaction and Information Management,” Apr. 30, 2004. |
Davis, M., et al., U.S. Appl. No. 10/947,986, “Optimizing Profitability in Business Transactions,” Sep. 23, 2004. |
Hingoranee, R., et al., U.S. Appl. No. 10/952,327, “Systems and Methods for Management and Dissemination of Information from a Controlled Environment Facility,” Sep. 28, 2004. |
Keiser, L., et al., U.S. Appl. No. 11/125,842, “Processor-based Self-service Terminals Used with Respect to Controlled Environment Facilities,” May 10, 2005. |
Sidler, J., et al., U.S. Appl. No. 11/182,625, “Systems and Methods for Acquiring, Accessing, and Analyzing Investigative Information,” Jul. 15, 2005. |
Falcone, R., et al., U.S. Appl. No. 11/386,032, “Systems and Methods for Account Management Using Interrupt Messaging,” Mar. 21, 2006. |
Polozola, M., U.S. Appl. No. 11/386,056, “Management of Provision of Services Based at least in Part Information About a Payer's Utility,” Mar. 21, 2006. |
International Search Report for European Patent Application No. 07252653.6 based on U.S. Appl. No. 11/0480,264 “Systems and Methods for Account Management Using Interrupt Messaging,” Evercom Systems, Inc., Mar. 3, 2008, 12 pages. |
Dye, Charles, “Oracle Distributed Systems,” O'Reilly Media, Inc., Apr. 1, 1999. |
McCollum, “Federal Prisoner Health Care Copayment Act of 2000,” House of Representatives Report 106-851, 106th Congress 2d Session, Sep. 14, 2000. |
Anderson, Susan, “Three-Way Call Detect . . . Close Enough to Perfect?” Correctional Communications Quarterly, pp. 16-20, Oct. 1993. |
Bahl, L. “A Maximum Likelihood Approach to Continuous Speech Recovery,” Readings in Speech Recoqnition, Ed. A. Waibel and K. Lee, Morqan Kaufmann Publishers, pp. 308-319, IEEE 1983. |
Batten, A. “Personal Communications Service and the Intelligent Network,” British Telecommunications Enaineerina, vol. 9, pp. 88-91, Aua. 1990. |
DPD/120-JP Product on Display at Communications Tokyo '01, Apr. 2-5, 1991 (Product described in U.S. Pat. No. 5,218,636). |
European Examination Report, EP07251570.3, May 29, 2008, 5 pages. |
Exhibits A-N, Various materials compiled by Applicants. |
HR Solutions, http://www.solutions.hrd.com/methods_of electronic_monitoring.htm, p. 4 of 5, Telephone Surveillance. |
Jones International, http://www.jonesencyclo.com/encyclo/update/ecpa.html, 1-7, Electronic Communications Privacy Act. |
LazerVoice, Digital Recording System Inmate Services, 1997-1998, Schlumberger Technologies, Inc. I LazerVoice STIL V0222 LazerVoice User's Manual—Version 2.22, pp. 1-41, published Apr. 28, 1998 by Schlumberger Technologies, Inc./LazerVoice of Mobile, Alabama. |
“LazerPhone User Reference Manual,” 150 pages, edition and publisher unknown. |
“LazerPhone Inmate Telephone System, Users Manual version 1.0,” pp. 1-29, published Oct. 1998 by Schlumberaer Technoloaies, Inc./Global TerLink* of Mobile, Alabama. |
LazerPhone, Powerful Performance Uncompromising Standards, 1998. |
Lazer Phone Technical Manual, “Chapter I. System Overview,” pp. 1.1-1.6, published by Schlumberger Technologies, Inc. of Mobile, Alabama. |
Lee, K., “Large-Vocabulary Speaker-Independent Continuous Speech Recognition Using HMM,” Carnegie Mellon University Department of Electrical and Computer Enaineerina, CMU-CS-88-148, Apr. 1988. |
Manual for “DPD/120-JP Dial Pulse Detection Board,” Dialogic Systems Ltd., Tokyo, Japan, (Product described in U.S. Pat. No. 5,218,636), undated. |
OSSGR, vol. 3, “Feature Specific Documents,” Technical Ref. TSY-000271 FSD 85/01/0100 Calling Card Service—Published by Bell Communications Research-Revision #3, Dated Mar. 1988. |
OSSGR, vol. 3, “Feature Specific Documents,” Technical Ref. TSY-000271 FSD-85-01-0200 Collect Billing—Published by Bell Communications Research-Revision #3 Dated Mar. 1988. |
PCT International Search Report, PCT/US99/09493, dated Aug. 20, 1999, 5 pages. |
PCT Written Opinion, PCT/US99/09493, dated Feb. 9, 2000, 12 pages. |
“PPCS (Prison Prepaid Card System)”, DiaVox Technologies, Inc., Nov. 2000, 10 pages. |
Scidyn Commander 3-Way Call Detection System [online] [Retrieved on Jun. 20, 2006] Retrieved from: http://www.scidvn.com/products/Commander%203-wav%20Detection.pdf, 5 paqes. |
“System 20” Value Added Communications (VAC), Nov. 1992, Brochure (4 pages). |
Telematic “ConQuest III Inmate Telephone System,” Nov. 1992. |
Thermos, P., “Two Attacks Against VoIP,” Security Focus, XP-002444627, Apr. 4, 2006, pp. 1-8. |
“VoIP the Evolving Solution and the Evolving Threat,” Internet Security Systems, Inc., XP-002444626, 2004, pp. 1-7. |
McNitt, George, et al., U.S. Appl. No. 10/420,585, entitled System and Method for Detecting Unauthorized Call Activity. |
Groenfeldt, Tom, “CFO: The Magazine for Senior Financial Executives,” Oct. 1995, pp. 97-99, vol. 11, No. 10. |
Bharatia et al., “Redirection Service Capability in SIP,” Nov. 2001, 20 pages. |
Womack, Brian, Boise dot.com aids transfers of money to prison inmates, The Idaho Business Review, Jan. 22, 2001, p. A7, vol. 20, Issue 12. |
Number | Date | Country | |
---|---|---|---|
20150310400 A1 | Oct 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12042861 | Mar 2008 | US |
Child | 14703639 | US |