US20150319612A1 - System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment - Google Patents
System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment Download PDFInfo
- Publication number
- US20150319612A1 US20150319612A1 US14/267,383 US201414267383A US2015319612A1 US 20150319612 A1 US20150319612 A1 US 20150319612A1 US 201414267383 A US201414267383 A US 201414267383A US 2015319612 A1 US2015319612 A1 US 2015319612A1
- Authority
- US
- United States
- Prior art keywords
- call
- user
- notification
- module
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012795 verification Methods 0.000 claims abstract description 36
- 230000001413 cellular effect Effects 0.000 claims abstract description 30
- 238000012545 processing Methods 0.000 claims description 61
- 230000008569 process Effects 0.000 claims description 17
- 238000004891 communication Methods 0.000 claims description 15
- 230000004044 response Effects 0.000 claims description 11
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000002708 enhancing effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 9
- 230000009471 action Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000001815 facial effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 229940079593 drug Drugs 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000002207 retinal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/47—Fraud detection or prevention means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/10—Account details or usage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/30—Prepayment of wireline communication systems, wireless communication systems or telephone systems using a code
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M17/00—Prepayment of wireline communication systems, wireless communication systems or telephone systems
- H04M17/30—Prepayment of wireline communication systems, wireless communication systems or telephone systems using a code
- H04M17/308—Code management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
- H04M3/382—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42085—Called party identification service
- H04M3/42102—Making use of the called party identifier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/436—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
- H04M3/4365—Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/48—Secure or trusted billing, e.g. trusted elements or encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/835—Time or frequency of notifications, e.g. Advice of Charge [AoC]
- H04M15/8351—Time or frequency of notifications, e.g. Advice of Charge [AoC] before establishing a communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/858—Request users acknowledgement prior to use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6045—Identity confirmation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6081—Service authorization mechanisms
Definitions
- the disclosure relates to a system and method for identifying and authenticating called parties and/or fund contributors of members of a controlled environment.
- inmate In controlled environments, such as prisons for example, member (hereinafter “inmate”) communications with individuals outside the controlled environment are carefully regulated and monitored. As part of a communications system within a controlled environment, the inmate or somebody on the inmate's behalf can set up a deposit account to be used by the inmate to pay for telephone calls, internet access, etc. When the inmate makes a telephone call, funds can be drawn from the deposit account.
- an inmate may be required to provide certain personal information in order to verify his identity and/or address
- the inmate can use a prepaid calling card, or the call can be made collect, both of which are substantially anonymous.
- FIG. 1 illustrates an inmate calling environment according to an exemplary embodiment
- FIG. 2 illustrates an inmate calling platform according to an exemplary embodiment
- FIG. 3 illustrates a cellular telephone according to an exemplary embodiment
- FIG. 4 illustrates a flowchart diagram of an exemplary method for registering a cellular phone with an inmate calling platform
- FIG. 5 illustrates a flowchart diagram of a method for processing an outgoing call by an inmate at an inmate calling platform
- FIG. 6 illustrates a flowchart diagram of a method for processing call acceptance and authentication.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors.
- a machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device).
- a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others.
- firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact results from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof.
- each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module.
- multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- FIG. 1 illustrates a block diagram of an inmate calling environment 100 according to an exemplary embodiment.
- an inmate of the controlled environment makes a telephone call via an inmate telephone 110 .
- the inmate telephone 110 communicates with an inmate calling platform 120 .
- the inmate calling platform 120 manages several aspects of the call and call processing, including call routing, user authentication, billing, monitoring, etc. After processing the signals received from the inmate telephone 110 , the inmate calling platform 120 transmits those signals to the telephone 170 of a called party via a telephone network 150 .
- any of the various connections of the inmate calling environment 100 can be VoIP, and that the inmate telephone 110 can be a wireless, macro-cellular, or personal telephone.
- the called telephone 170 is a cellular telephone that receives the signals from the telephone network 150 via a base station 160 connected to the telephone network 150 .
- the called telephone 170 is a cellular telephone
- conventional called party identification may easily be subverted. Specifically, even as little as 20 years ago, conventional landline telephones dominated mainstream use and were registered with a person's name and a billing address that typically matched their residential address. With this information, called parties could easily be identified.
- the exemplary calling environment 100 includes an inmate calling platform 120 to enhance data gathering and security regarding called telephones, as described below.
- FIG. 2 illustrates a block diagram of an inmate calling platform 200 according to an exemplary embodiment.
- the inmate calling platform 200 includes an I/O module 210 , a call processing module 220 , a notification module 230 , an authentication module 240 , a memory module 250 , and a registration module 260 , and optionally includes a billing module 270 and a monitoring module 280 , and may represent an exemplary embodiment of the inmate calling platform 120 .
- FIG. 3 illustrates a block diagram of a device 300 according to an exemplary embodiment.
- the device 300 includes an application module 310 (that includes a user verification module 312 , a user authentication module 314 , and a notification processing module 316 ), a biometric module 320 , a user interface module 330 , an electronic text communication module 340 , a camera module 350 , a display module 360 , and a device memory module 370 , and may represent an exemplary embodiment of the cellular telephone 170 .
- an application module 310 that includes a user verification module 312 , a user authentication module 314 , and a notification processing module 316
- a biometric module 320 that includes a user verification module 312 , a user authentication module 314 , and a notification processing module 316
- a biometric module 320 that includes a user verification module 312 , a user authentication module 314 , and a notification processing module 316
- a biometric module 320 that includes a user verification
- FIGS. 2 and 3 A system for identifying called parties will now be described relative to FIGS. 2 and 3 .
- one goal of the present disclosure is to acquire identifying information of a particular called party.
- One way to achieve this goal is to restrict inmate calls to or from cellular telephones unless those cellular telephones and their users have been pre-registered with the inmate calling platform 200 .
- the pre-registration involves the cellular telephone user submitting certain personal information to the inmate calling platform 200 for storage and later reference.
- the registration process described below is initiated either upon the outside number first being called from the prison facility, or upon the outside number first placing a call to the prison facility.
- the call processing module 220 places the inmate on hold (or delay call connection) while at least a portion of the registration process takes place, and then connect the user with the inmate following the completion of that portion.
- the cellular telephone user downloads a mobile application (e.g., an “app”) that handshakes and communicates with the inmate calling platform 200 .
- a mobile application e.g., an “app”
- the application module 310 of the device 300 includes the functionality of the app.
- Device 300 can be, for example, a cellular telephone or smartphone.
- the app Upon installation and loading of the app, the app performs an initial registration of the user. For example, the app is pre-registered with the specific controlled environment or prison of the inmate or the desired controlled environment(s) is selected from a list. Once selected, the app prompts the user via the display module 360 for one or more pieces of identifying information, which device 300 acquires using the various hardware capabilities common among cellular telephones and smartphones.
- the application module 310 prompts the user to input various biometric data using the device's biometric module 320 .
- the biometric data capable of being acquired will be dependent on the hardware capabilities of the biometric module 320 , but may include one or more fingerprints, a retinal scan, and/or a voiceprint, among others.
- the application module 310 prompts the user to input a password and/or personal identification number (PIN) to be associated with that user. Upon being prompted, the user could interface with the user interface module 330 in order to enter the password/PIN information.
- PIN personal identification number
- the application module 310 prompts the user to submit a photo of his/her face using the camera module 350 .
- the facial photo is later be used for facial recognition purposes, etc.
- the application module 310 also requests the user to capture an image of a picture ID using the device's camera module 350 . This can be particularly useful because most picture IDs include some form of a description of the person, as well as a known address of that person. As most current picture IDs include some form of a barcode, in an embodiment, the application module 310 prompts the user to capture a picture of the barcode, which is then analyzed for identifying information. In an embodiment, the application module 310 provides the option to the user of capturing an image of a utility bill or other piece of mail with their name and address printed thereon.
- the user verification module 312 of the application module 310 connects to the inmate calling platform 200 .
- the user verification module 312 packages the user's personal verification data, and transmits that data to the inmate calling platform 200 .
- the user verification module 312 transmits the personal verification data together with at least one of a device phone number and a device identification number associated with the cellular telephone of a user.
- incoming and outgoing communications pass through the I/O module 210 .
- the call processing module 220 performs general information processing and routing. Therefore, as the user verification module 312 connects with the inmate calling platform, the initial request is routed through the I/O module 210 and the call processing module 220 to the registration module 260 , which performs the initial registration of users.
- the registration module 260 handshakes with the device 300 and receives the personal verification data from the user. Once the personal verification data is received, the registration module 260 registers the user and the device with the inmate calling platform 200 by storing the telephone number and/or device identification number in the memory module 250 . The registration module 260 also stores the various pieces of personal verification information in the memory module in association with the telephone/device number. In this manner, the user's personal verification information and the phone device becomes registered to the telephone number of the user. As such, future phone calls to this number will be known to be made to the user registered, as will be discussed in further detail below.
- the registration module 260 issues a notification to the device 300 of the successful registration.
- the registration module 260 causes a letter to be mailed to the address provided in order to confirm that the address is current.
- the registration module 260 notifies authorized personal to generate the letter and provide the necessary information of the user, or the registration module 260 generates the letter (alone or in conjunction with a separate module and/or device).
- the successful notification transmitted to the application module 310 of the device 300 .
- the registration module 260 provides the option or requires that the user elect for geofencing capabilities. Geofencing permits the user's location to be tracked before, during, and/or after a call for use by the inmate calling platform 200 in investigative functions. In an embodiment, the location information is tracked and compiled by the app loaded on the device 300 , and transmitted to the inmate calling platform 200 at predetermined times (e.g., the end of a call). In this manner, the inmate calling platform 200 provides useful information for investigation purposes.
- the device 300 is permitted to receive telephone calls from the inmate.
- the functionality of the registration process can be embodied on a website.
- the user accesses the website to verify his personal and contact information in order to gain calling access.
- the functionality of the registration process is achieved using “traditional” telephones.
- the user contacts an 800 or equivalent service number. Once connected to the service number, a computer system or live agent directs the caller through the process of registering his account.
- the inmate calling platform 200 will interact with the app on the registered device in order to facilitate the communication.
- an inmate places a call from a local telephone within or managed by the controlled facility. This call is routed to the inmate calling platform 200 via its I/O module 210 . The call is received by the call processing module 220 , which first detects whether the inmate is permitted to call the called number.
- Calls placed to certain telephone numbers can be blocked for many reasons. For example, inmates are generally restricted from calling witnesses or judges associated with their case, victims or victim family members, etc. Therefore, as an initial check, the call processing module 220 accesses a blocked call list from the memory module 250 associated with the inmate in order to determine whether the desired number is blocked. If the number is not blocked, the call processing module 220 performs a subsequent check to determine whether the number is associated with a device, such as device 300 . This can be done locally, or by accessing a national/global phone number registry, etc.
- the call processing module 220 processes the call as normal, for example, by contacting the called party and requesting acceptance from the called party before connecting the call. In another embodiment, the call processing module 220 prompts the non-wireless user to acquire a PIN via a different method, as discussed below. If it is determined that the phone number is associated with a device, such as device 300 , the call processing module 220 accesses the memory module to determine if the telephone number has been registered.
- the call processing module 220 determines that the phone number being called has not been registered with the inmate calling platform 200 , then the call processing module 220 causes the notification module 230 to generate a notification, which the inmate calling platform 200 transmits to the called number via the I/O module 210 .
- the notification can be a pre-recorded voice message, an SMS text message, an email message, or other notification, and is used to inform the recipient that a member of the controlled facility seeks to contact them, as well as provide instructions as to how to acquire and install the necessary app for communicating with the inmate.
- the call processing module 220 terminates the inmate's telephone call, and optionally provides a notification to the inmate as to the reason for the termination.
- the call processing module 220 determines that the telephone number is registered, the call processing module 220 causes the notification module 230 to generate a notification to be transmitted to the called party via the I/O module 210 .
- the notification informs the called party that an inmate of the controlled facility seeks to talk with the called party, and also provides the name and/or other identifying information of the inmate.
- the notification is configured to be received by the application module 310 of the device 300 .
- the notification processing module 316 receives the notification from the inmate calling platform 200 and extracts the identifying information of the inmate, as well as the indication that a call is being requested.
- the application module 310 causes the display module 360 to graphically notify the user of the device 300 that a call is being requested from the inmate, and prompts the user to accept or reject the call via the user interface module 330 . If the user accepts the call, the application module 310 controls the user authentication module 314 to verify the user's identity, such as by prompting for and verifying the user's PIN number.
- the application module 310 tracks a time from notifying the device user, and if the user fails to respond accept or reject the call within a predetermined amount of time, the application module 310 responds to the inmate calling platform 200 with a “timeout” notification. Alternatively, this timing is performed directly by the inmate calling platform 200 . When the notification times out, the inmate calling platform terminates the call.
- the notification processing module 316 transmits a “call rejected” notification to the inmate calling platform 200 , at which time the call processing module 220 terminates the inmate's call.
- the application module 310 upon rejecting a call from an inmate, the application module 310 further prompts the user as to whether the user would like to block future calls from the inmate. The user's response to this query is included in the “call rejected” notification, which the call processing module 220 uses to update its blocked number list.
- the user authentication module 314 prompts the user via the display module 360 to enter his PIN. In response, the user enters his PIN via the user interface module 330 , which the user authentication module 314 receives.
- the user authentication module 314 authenticates the user by comparing the entered PIN to the registered PIN stored in the device memory module 370 . If a mismatch is detected, the user authentication module 314 re-prompts the user for his PIN a predetermined number of times.
- the notification processing module 316 transmits an “authentication failed” notification to the inmate calling platform 200 .
- the call processing module 220 then terminates the call. In an embodiment, the call processing module 220 further flags the registered phone number with a “caution” flag, which is later referenced to indicate the need for additional security for this number, whether by requiring call monitoring, additional identification information from the called party, and/or similar requirements.
- the notification processing module 316 transmits an “authentication successful” notification to the inmate calling platform 200 .
- the call processing module 220 receives the “authentication successful” notification, the call processing module 220 causes the inmate's call to be connected to the user's device.
- the notification processing module 316 includes the user's PIN in the “authentication successful” notification to allow the inmate calling platform to perform an independent authentication of the user using authentication module 240 . This prevents a user of the device from subverting the system by tampering with the stored identification information at device 300 .
- the authentication module 314 requires alternative or additional identification information from the user other than the PIN.
- the call processing module 220 causes the notification module 230 to transmit a “conditions” notification to the device 300 .
- This “conditions” notification includes various conditions that the called party must satisfy in order to maintain the call. For example, the called party may be required to keep their face in sight of the device's camera, may be prohibited from allowing any other voices on the call, may be required to submit biometric or other identifying information at intervals throughout the call, etc. The satisfaction of these parameters is checked and monitored by the user authentication module 314 of the device 300 .
- the application module 310 takes any of various actions, including muting the line, muting the call, placing the parties on hold, and/or terminating the call.
- the application module 310 also transmits a notification to the inmate calling platform 200 to take appropriate action, such as adding the called number to the blocked number list, or flagging the called number with a “caution” flag for increased security for future calls.
- the app and the inmate calling platform 200 communicate the various errors and/or other statuses between each other, they are each able to enhance their own functionality based on the occurrences taking place at the other.
- the inmate calling platform 200 can not require a POTS phone to install an app for handshaking therewith, the platform 200 can nonetheless require registration of the phone for purposes of authenticating the phone during calls to or from the controlled environment.
- the call processing module 220 upon receiving a request to place a call between an inmate and a number that has not been registered with the platform 200 , the call processing module 220 makes a determination as to whether the unregistered number is associated with a cellular telephone.
- the above discussion details procedures for handling a cellular telephone.
- the call processing module 220 determines the phone to be a non-wireless telephone, the call processing module 220 prompts the user of the non-wireless telephone to register a PIN.
- the call processing module 220 directs the non-wireless telephone user to a live person or computerized system for acquiring the user's personal information and administering the user a PIN.
- the registration module 260 registers the phone number with the PIN in the memory module 250 for later reference.
- the inmate calling platform 200 informs the user to acquire a PIN before establishing a first call with the user's number, but allow the first call to continue following the notification.
- the inmate calling platform 200 then stores the user's number for future reference to bar further calls until the number has been registered and received a PIN.
- the inmate calling platform 200 places other restrictions on the first (unregistered) call, such as by restricting the length of the call, performing live monitoring, etc.
- the call processing module 220 authenticates the user upon when called or calling by requesting and confirming the user's PIN. In this manner, the inmate calling platform 200 provides a level of security relating to non-wireless telephone calls.
- FIG. 4 illustrates a flowchart diagram of an exemplary method for registering a cellular telephone with an inmate calling platform.
- the app is run by the application module 310 of the device 300 , and registers with the inmate calling platform 200 .
- the device 300 is a cellular telephone.
- the app When the app is installed and first run ( 410 ), the app prompts the user for personal verification information ( 420 ). In an embodiment, the app requires multiple pieces of personal verification information. After the app has prompted for the personal verification information ( 420 ), the app checks to determine whether the user has complied and provided sufficient personal verification information ( 425 ). If the user has not provided sufficient personal verification information ( 425 —N), then the registration fails ( 430 ).
- the app determines that the user has provided sufficient personal verification information ( 425 —Y)
- the app compiles, packages, and transmits the personal verification information to the inmate calling platform ( 440 ).
- the registration module 260 causes the personal verification information to store the personal verification information in the memory module 250 in association with the device phone number and/or device identification number ( 450 ).
- the inmate calling platform 200 requests an additional level of verification.
- the notification module 230 transmits a notification to the device 300 informing him that a letter has been sent to a home, email, or other address and requesting the user to verify that address by responding when received. If the response is not received within a predetermined time ( 475 —N), the registration fails ( 430 ). On the other hand, if the response is received with the predetermined time ( 475 —Y), the notification module 230 transmits a “success” notification back to the device 300 in order to complete the registration.
- FIG. 5 illustrates a flowchart diagram of a method for processing an outgoing call by an inmate at an inmate calling platform.
- the call is processed by the inmate calling platform 200 .
- an inmate of the controlled facility initiates call ( 505 ) by dialing a number to an outside (called) party.
- the inmate calling platform 200 determines if the dialed number is on a block list associated with the inmate ( 515 ). If the number is blocked ( 515 —Y), the inmate calling platform 200 terminates the call ( 580 ). If the number is not on the block list ( 515 —N), the inmate calling platform 200 determines if the dialed number is associated with a device, such as device 300 ( 525 ).
- the inmate calling platform 200 processes the call as normal. For example, the inmate calling platform 200 calls the recipient 530 and prompts for acceptance of the call. If the call is accepted by the called party ( 535 —Y), the inmate calling platform 200 connects the called party to the inmate. On the other hand, if the call is rejected by the called party ( 535 —N), the inmate calling platform terminates the call 540 .
- the inmate calling platform 200 determines that the number is associated with a device, such as device 300 ( 525 —Y)
- the inmate calling platform 200 checks to determine whether the called number is registered with the system ( 555 ). If it is determined that the called number is not registered ( 555 —N), the inmate calling platform 200 forwards registration information to the called party ( 560 ) and terminates the call ( 580 ).
- the registration information can be forwarded by email or other electronic message, by a pre-recorded voice message, or other suitable method.
- the inmate calling platform 200 sends a call notification to the device 300 .
- the inmate calling platform 200 checks whether the PIN (or other personal verification information) has been received ( 575 ). If the PIN is not received within a predetermined time, or does not match the registered PIN ( 575 —N), the inmate calling platform 200 terminates the call. Alternatively, if the PIN is received within the predetermined time and matches the registered PIN ( 575 —Y), the inmate calling platform 200 processes the call by connecting the inmate to the called party.
- the inmate calling platform 200 processes all calls in accordance with the registration process. In other words, all called numbers are checked for registration in order to process the calls. This omits steps ( 525 )-( 550 ) from the method described above.
- FIG. 6 illustrates a flowchart diagram of a method for processing call acceptance and authentication by a called party. In an embodiment, portions of the method are performed by the inmate calling platform 200 and the device 300 . In an embodiment, the device 300 is a cellular telephone.
- the inmate calling platform 200 Upon the call being initiated by an inmate, the inmate calling platform 200 transmits a call notification to the device 300 ( 605 ).
- the device 300 prompts the user to either accept or reject the incoming call ( 610 ). If the call is rejected ( 625 —N), the device 300 further prompts the user as to whether he would like to block future calls from the inmate ( 620 ). If the user indicates that they would like future calls blocked ( 620 —Y), the device 300 transmits a “block” notification back to the inmate calling platform 200 indicating that the number associated with the device 300 should be added to the inmate's block list ( 630 ). In that case, the inmate calling platform 200 will add the number to the block list ( 625 ) and terminate the call. Alternatively, if the user responds that he does not wish to block future calls ( 620 —N), then the device 300 issues a “reject” notification ( 622 ), which causes the inmate calling platform to simply terminate the call ( 615 ).
- the device 300 next prompts the user for his PIN or other personal verification information ( 640 ). Upon entry of the PIN, the device 300 authenticates the user by comparing the entered PIN to a previously stored PIN ( 645 ). If the PIN authentication fails ( 645 —N), the device 300 reprompts ( 640 ) the user a predetermined number of times before terminating the call. If the PIN authentication is successful ( 645 —Y), the device 300 issues an “accept” notification to the inmate calling platform 200 .
- the inmate calling platform 200 Upon receiving the accept notification (and optionally also receiving personal verification information for independently verifying the user's identity), the inmate calling platform 200 transmits a “conditions” notification ( 655 ) to the device 300 setting forth the conditions that must be met in order to avoid call interruption/termination. The inmate calling platform 200 then forwards the inmate's call to the device 300 ( 665 ).
- the device 300 processes the conditions ( 660 ) and monitors their satisfaction while processing the call ( 670 ) between the inmate and the device user.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Technology Law (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- The disclosure relates to a system and method for identifying and authenticating called parties and/or fund contributors of members of a controlled environment.
- In controlled environments, such as prisons for example, member (hereinafter “inmate”) communications with individuals outside the controlled environment are carefully regulated and monitored. As part of a communications system within a controlled environment, the inmate or somebody on the inmate's behalf can set up a deposit account to be used by the inmate to pay for telephone calls, internet access, etc. When the inmate makes a telephone call, funds can be drawn from the deposit account.
- Although a person creating a deposit account on behalf of an inmate may be required to provide certain personal information in order to verify his identity and/or address, there are many alternative ways for an inmate to mask a source of funding for a particular call. For example, the inmate can use a prepaid calling card, or the call can be made collect, both of which are substantially anonymous.
- Embodiments are described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
-
FIG. 1 illustrates an inmate calling environment according to an exemplary embodiment; -
FIG. 2 illustrates an inmate calling platform according to an exemplary embodiment; -
FIG. 3 illustrates a cellular telephone according to an exemplary embodiment; -
FIG. 4 illustrates a flowchart diagram of an exemplary method for registering a cellular phone with an inmate calling platform; -
FIG. 5 illustrates a flowchart diagram of a method for processing an outgoing call by an inmate at an inmate calling platform; and -
FIG. 6 illustrates a flowchart diagram of a method for processing call acceptance and authentication. - The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the disclosure. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
- The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the disclosure. Therefore, the Detailed Description is not meant to limit the invention. Rather, the scope of the invention is defined only in accordance with the following claims and their equivalents.
- Embodiments may be implemented in hardware (e.g., circuits), firmware, software, or any combination thereof. Embodiments may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact results from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc. Further, any of the implementation variations may be carried out by a general purpose computer, as described below.
- For purposes of this discussion, any reference to the term “module” shall be understood to include at least one of software, firmware, and hardware (such as one or more circuit, microchip, or device, or any combination thereof), and any combination thereof. In addition, it will be understood that each module may include one, or more than one, component within an actual device, and each component that forms a part of the described module may function either cooperatively or independently of any other component forming a part of the module. Conversely, multiple modules described herein may represent a single component within an actual device. Further, components within a module may be in a single device or distributed among multiple devices in a wired or wireless manner.
- The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the invention that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or adapt for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the disclosure. Therefore, such adaptations and modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
- Although the description below is made with respect to a prison facility or other controlled environment, the disclosed systems and methods can be used in any communication environment.
- Inmate Calling Environment
-
FIG. 1 illustrates a block diagram of aninmate calling environment 100 according to an exemplary embodiment. In theinmate calling environment 100, an inmate of the controlled environment makes a telephone call via aninmate telephone 110. Theinmate telephone 110 communicates with aninmate calling platform 120. - The
inmate calling platform 120 manages several aspects of the call and call processing, including call routing, user authentication, billing, monitoring, etc. After processing the signals received from theinmate telephone 110, the inmate callingplatform 120 transmits those signals to thetelephone 170 of a called party via atelephone network 150. - In embodiments, any of the various connections of the
inmate calling environment 100 can be VoIP, and that theinmate telephone 110 can be a wireless, macro-cellular, or personal telephone. - In an embodiment, the called
telephone 170 is a cellular telephone that receives the signals from thetelephone network 150 via abase station 160 connected to thetelephone network 150. When the calledtelephone 170 is a cellular telephone, conventional called party identification may easily be subverted. Specifically, even as little as 20 years ago, conventional landline telephones dominated mainstream use and were registered with a person's name and a billing address that typically matched their residential address. With this information, called parties could easily be identified. - However, this registration process can easily be subverted with the advent of cellular telephones. As one example, cellular telephones can easily be registered in the name of one person, and physically owned by another. As another example, more recently, disposable cellular telephones commonly referred to as “burners” have become popular, especially among drug dealers and other criminals. These burners can be purchased and prepaid in cash and do not require any registration or identity verification.
- Because of the anonymity of many cellular telephones, conventional inmate calling environments are unable to acquire any information of called parties beyond their phone numbers. Specifically, provided that a particular number is not on an inmate's “blacklist” (e.g., a list of prohibited contact numbers for that particular inmate), the inmate is generally permitted to call that particular number. Further, although conventional systems request permission to complete the call from the called party, this request typically amounts to nothing more than a single key press (e.g., “#”). As such, calls are permitted between the inmate and anonymous persons without acquiring any identifying information of the called parties.
- To address this situation, the
exemplary calling environment 100 includes an inmate callingplatform 120 to enhance data gathering and security regarding called telephones, as described below. - Called Party Identification
- In order to facilitate called party identification, the inmate calling
platform 120 requires cooperation from a cellular telephone before calls can be placed.FIG. 2 illustrates a block diagram of aninmate calling platform 200 according to an exemplary embodiment. In an embodiment, theinmate calling platform 200 includes an I/O module 210, acall processing module 220, anotification module 230, anauthentication module 240, amemory module 250, and aregistration module 260, and optionally includes abilling module 270 and amonitoring module 280, and may represent an exemplary embodiment of theinmate calling platform 120. -
FIG. 3 illustrates a block diagram of adevice 300 according to an exemplary embodiment. In an embodiment, thedevice 300 includes an application module 310 (that includes a user verification module 312, auser authentication module 314, and a notification processing module 316), abiometric module 320, a user interface module 330, an electronictext communication module 340, acamera module 350, adisplay module 360, and a device memory module 370, and may represent an exemplary embodiment of thecellular telephone 170. - A system for identifying called parties will now be described relative to
FIGS. 2 and 3 . - Outside Party Registration
- As previously mentioned, one goal of the present disclosure is to acquire identifying information of a particular called party. One way to achieve this goal is to restrict inmate calls to or from cellular telephones unless those cellular telephones and their users have been pre-registered with the
inmate calling platform 200. The pre-registration involves the cellular telephone user submitting certain personal information to theinmate calling platform 200 for storage and later reference. In embodiments, the registration process described below is initiated either upon the outside number first being called from the prison facility, or upon the outside number first placing a call to the prison facility. In an embodiment, in either scenario, thecall processing module 220 places the inmate on hold (or delay call connection) while at least a portion of the registration process takes place, and then connect the user with the inmate following the completion of that portion. - In order to perform this registration, as well as many other functions as will be described herein, the cellular telephone user downloads a mobile application (e.g., an “app”) that handshakes and communicates with the
inmate calling platform 200. As shown inFIG. 3 , theapplication module 310 of thedevice 300 includes the functionality of the app.Device 300 can be, for example, a cellular telephone or smartphone. - Upon installation and loading of the app, the app performs an initial registration of the user. For example, the app is pre-registered with the specific controlled environment or prison of the inmate or the desired controlled environment(s) is selected from a list. Once selected, the app prompts the user via the
display module 360 for one or more pieces of identifying information, whichdevice 300 acquires using the various hardware capabilities common among cellular telephones and smartphones. - For example, in an embodiment the
application module 310 prompts the user to input various biometric data using the device'sbiometric module 320. The biometric data capable of being acquired will be dependent on the hardware capabilities of thebiometric module 320, but may include one or more fingerprints, a retinal scan, and/or a voiceprint, among others. - In an embodiment, the
application module 310 prompts the user to input a password and/or personal identification number (PIN) to be associated with that user. Upon being prompted, the user could interface with the user interface module 330 in order to enter the password/PIN information. - In an embodiment, the
application module 310 prompts the user to submit a photo of his/her face using thecamera module 350. The facial photo is later be used for facial recognition purposes, etc. In an embodiment, theapplication module 310 also requests the user to capture an image of a picture ID using the device'scamera module 350. This can be particularly useful because most picture IDs include some form of a description of the person, as well as a known address of that person. As most current picture IDs include some form of a barcode, in an embodiment, theapplication module 310 prompts the user to capture a picture of the barcode, which is then analyzed for identifying information. In an embodiment, theapplication module 310 provides the option to the user of capturing an image of a utility bill or other piece of mail with their name and address printed thereon. - Once the
application module 310 has received a predetermined amount of personal verification data from the user, the user verification module 312 of theapplication module 310 connects to theinmate calling platform 200. The user verification module 312 packages the user's personal verification data, and transmits that data to theinmate calling platform 200. In an embodiment, the user verification module 312 transmits the personal verification data together with at least one of a device phone number and a device identification number associated with the cellular telephone of a user. - At the
inmate calling platform 200, incoming and outgoing communications pass through the I/O module 210. Thecall processing module 220 performs general information processing and routing. Therefore, as the user verification module 312 connects with the inmate calling platform, the initial request is routed through the I/O module 210 and thecall processing module 220 to theregistration module 260, which performs the initial registration of users. - The
registration module 260 handshakes with thedevice 300 and receives the personal verification data from the user. Once the personal verification data is received, theregistration module 260 registers the user and the device with theinmate calling platform 200 by storing the telephone number and/or device identification number in thememory module 250. Theregistration module 260 also stores the various pieces of personal verification information in the memory module in association with the telephone/device number. In this manner, the user's personal verification information and the phone device becomes registered to the telephone number of the user. As such, future phone calls to this number will be known to be made to the user registered, as will be discussed in further detail below. - Once the user has been successfully registered, the
registration module 260 issues a notification to thedevice 300 of the successful registration. In an embodiment, as an added level of security, theregistration module 260 causes a letter to be mailed to the address provided in order to confirm that the address is current. In order to perform this action, theregistration module 260 notifies authorized personal to generate the letter and provide the necessary information of the user, or theregistration module 260 generates the letter (alone or in conjunction with a separate module and/or device). In this embodiment, only after the letter has been returned to a particular address with certain personal verification information of the user filled in is the successful notification transmitted to theapplication module 310 of thedevice 300. - In an embodiment, the
registration module 260 provides the option or requires that the user elect for geofencing capabilities. Geofencing permits the user's location to be tracked before, during, and/or after a call for use by theinmate calling platform 200 in investigative functions. In an embodiment, the location information is tracked and compiled by the app loaded on thedevice 300, and transmitted to theinmate calling platform 200 at predetermined times (e.g., the end of a call). In this manner, theinmate calling platform 200 provides useful information for investigation purposes. - Once successfully registered, the
device 300 is permitted to receive telephone calls from the inmate. - Although described above as a app for a cellular telephone, in another embodiment, the functionality of the registration process can be embodied on a website. The user accesses the website to verify his personal and contact information in order to gain calling access. In another embodiment, the functionality of the registration process is achieved using “traditional” telephones. In this embodiment, the user contacts an 800 or equivalent service number. Once connected to the service number, a computer system or live agent directs the caller through the process of registering his account.
- Calls to Registered User
- Once the
device 300 has been registered with theinmate calling platform 200, the inmate is able to call thedevice 300 user. In doing so, theinmate calling platform 200 will interact with the app on the registered device in order to facilitate the communication. - As discussed above, one problem with conventional inmate telephone calls is that the called party is able to accept the call by a single button press, without any further identifying information. In the exemplary calling system, an inmate places a call from a local telephone within or managed by the controlled facility. This call is routed to the
inmate calling platform 200 via its I/O module 210. The call is received by thecall processing module 220, which first detects whether the inmate is permitted to call the called number. - Calls placed to certain telephone numbers can be blocked for many reasons. For example, inmates are generally restricted from calling witnesses or judges associated with their case, victims or victim family members, etc. Therefore, as an initial check, the
call processing module 220 accesses a blocked call list from thememory module 250 associated with the inmate in order to determine whether the desired number is blocked. If the number is not blocked, thecall processing module 220 performs a subsequent check to determine whether the number is associated with a device, such asdevice 300. This can be done locally, or by accessing a national/global phone number registry, etc. - If the number is not associated with a device, such as
device 300, thecall processing module 220 processes the call as normal, for example, by contacting the called party and requesting acceptance from the called party before connecting the call. In another embodiment, thecall processing module 220 prompts the non-wireless user to acquire a PIN via a different method, as discussed below. If it is determined that the phone number is associated with a device, such asdevice 300, thecall processing module 220 accesses the memory module to determine if the telephone number has been registered. - If the
call processing module 220 determines that the phone number being called has not been registered with theinmate calling platform 200, then thecall processing module 220 causes thenotification module 230 to generate a notification, which theinmate calling platform 200 transmits to the called number via the I/O module 210. The notification can be a pre-recorded voice message, an SMS text message, an email message, or other notification, and is used to inform the recipient that a member of the controlled facility seeks to contact them, as well as provide instructions as to how to acquire and install the necessary app for communicating with the inmate. Once the notification has been transmitted, thecall processing module 220 terminates the inmate's telephone call, and optionally provides a notification to the inmate as to the reason for the termination. - If the
call processing module 220 determines that the telephone number is registered, thecall processing module 220 causes thenotification module 230 to generate a notification to be transmitted to the called party via the I/O module 210. In this case, the notification informs the called party that an inmate of the controlled facility seeks to talk with the called party, and also provides the name and/or other identifying information of the inmate. In an embodiment, the notification is configured to be received by theapplication module 310 of thedevice 300. - The
notification processing module 316 receives the notification from theinmate calling platform 200 and extracts the identifying information of the inmate, as well as the indication that a call is being requested. Theapplication module 310 causes thedisplay module 360 to graphically notify the user of thedevice 300 that a call is being requested from the inmate, and prompts the user to accept or reject the call via the user interface module 330. If the user accepts the call, theapplication module 310 controls theuser authentication module 314 to verify the user's identity, such as by prompting for and verifying the user's PIN number. - In an embodiment, the
application module 310 tracks a time from notifying the device user, and if the user fails to respond accept or reject the call within a predetermined amount of time, theapplication module 310 responds to theinmate calling platform 200 with a “timeout” notification. Alternatively, this timing is performed directly by theinmate calling platform 200. When the notification times out, the inmate calling platform terminates the call. - If the user rejects the call, the
notification processing module 316 transmits a “call rejected” notification to theinmate calling platform 200, at which time thecall processing module 220 terminates the inmate's call. In an embodiment, upon rejecting a call from an inmate, theapplication module 310 further prompts the user as to whether the user would like to block future calls from the inmate. The user's response to this query is included in the “call rejected” notification, which thecall processing module 220 uses to update its blocked number list. - On the other hand, if the user accepts the call, the
user authentication module 314 prompts the user via thedisplay module 360 to enter his PIN. In response, the user enters his PIN via the user interface module 330, which theuser authentication module 314 receives. Theuser authentication module 314 authenticates the user by comparing the entered PIN to the registered PIN stored in the device memory module 370. If a mismatch is detected, theuser authentication module 314 re-prompts the user for his PIN a predetermined number of times. When the user ultimately fails to enter the correct PIN, thenotification processing module 316 transmits an “authentication failed” notification to theinmate calling platform 200. Thecall processing module 220 then terminates the call. In an embodiment, thecall processing module 220 further flags the registered phone number with a “caution” flag, which is later referenced to indicate the need for additional security for this number, whether by requiring call monitoring, additional identification information from the called party, and/or similar requirements. - If the
user authentication module 314 determines that the user has entered the correct PIN, thenotification processing module 316 transmits an “authentication successful” notification to theinmate calling platform 200. Once thecall processing module 220 receives the “authentication successful” notification, thecall processing module 220 causes the inmate's call to be connected to the user's device. In an embodiment, thenotification processing module 316 includes the user's PIN in the “authentication successful” notification to allow the inmate calling platform to perform an independent authentication of the user usingauthentication module 240. This prevents a user of the device from subverting the system by tampering with the stored identification information atdevice 300. - In an embodiment, the
authentication module 314 requires alternative or additional identification information from the user other than the PIN. Also, upon successful authentication of the user, thecall processing module 220 causes thenotification module 230 to transmit a “conditions” notification to thedevice 300. This “conditions” notification includes various conditions that the called party must satisfy in order to maintain the call. For example, the called party may be required to keep their face in sight of the device's camera, may be prohibited from allowing any other voices on the call, may be required to submit biometric or other identifying information at intervals throughout the call, etc. The satisfaction of these parameters is checked and monitored by theuser authentication module 314 of thedevice 300. - When the
user authentication module 314 detects that the user has failed any of the set conditions, theapplication module 310 takes any of various actions, including muting the line, muting the call, placing the parties on hold, and/or terminating the call. In addition, theapplication module 310 also transmits a notification to theinmate calling platform 200 to take appropriate action, such as adding the called number to the blocked number list, or flagging the called number with a “caution” flag for increased security for future calls. - Through the cooperation of the app on the
device 300 and theinmate calling platform 200, enhanced security and monitoring is provided for calls made to cellular telephones, smart phones, and similar devices. Further, because the app and theinmate calling platform 200 communicate the various errors and/or other statuses between each other, they are each able to enhance their own functionality based on the occurrences taking place at the other. - Although the above discussion is largely directed towards cellular telephones, at least a portion of the benefits resulting from the above configurations can be achieved for non-wireless phones through. Although the
inmate calling platform 200 can not require a POTS phone to install an app for handshaking therewith, theplatform 200 can nonetheless require registration of the phone for purposes of authenticating the phone during calls to or from the controlled environment. - As discussed above, upon receiving a request to place a call between an inmate and a number that has not been registered with the
platform 200, thecall processing module 220 makes a determination as to whether the unregistered number is associated with a cellular telephone. The above discussion details procedures for handling a cellular telephone. However, when thecall processing module 220 determines the phone to be a non-wireless telephone, thecall processing module 220 prompts the user of the non-wireless telephone to register a PIN. In an embodiment, thecall processing module 220 directs the non-wireless telephone user to a live person or computerized system for acquiring the user's personal information and administering the user a PIN. Theregistration module 260 then registers the phone number with the PIN in thememory module 250 for later reference. - Because of the time-consuming steps that may be involved in the registration process, and the likelihood of disconnecting from the call with the inmate, in an embodiment the
inmate calling platform 200 informs the user to acquire a PIN before establishing a first call with the user's number, but allow the first call to continue following the notification. Theinmate calling platform 200 then stores the user's number for future reference to bar further calls until the number has been registered and received a PIN. In an embodiment, theinmate calling platform 200 places other restrictions on the first (unregistered) call, such as by restricting the length of the call, performing live monitoring, etc. - After the user has been registered, the
call processing module 220 authenticates the user upon when called or calling by requesting and confirming the user's PIN. In this manner, theinmate calling platform 200 provides a level of security relating to non-wireless telephone calls. - Method of Registering a Phone
-
FIG. 4 illustrates a flowchart diagram of an exemplary method for registering a cellular telephone with an inmate calling platform. In an embodiment, the app is run by theapplication module 310 of thedevice 300, and registers with theinmate calling platform 200. In an embodiment, thedevice 300 is a cellular telephone. - When the app is installed and first run (410), the app prompts the user for personal verification information (420). In an embodiment, the app requires multiple pieces of personal verification information. After the app has prompted for the personal verification information (420), the app checks to determine whether the user has complied and provided sufficient personal verification information (425). If the user has not provided sufficient personal verification information (425—N), then the registration fails (430).
- If, on the other hand, the app determines that the user has provided sufficient personal verification information (425—Y), the app compiles, packages, and transmits the personal verification information to the inmate calling platform (440).
- At the
inmate calling platform 200, theregistration module 260 causes the personal verification information to store the personal verification information in thememory module 250 in association with the device phone number and/or device identification number (450). - Optionally, the
inmate calling platform 200 then requests an additional level of verification. In particular, thenotification module 230 transmits a notification to thedevice 300 informing him that a letter has been sent to a home, email, or other address and requesting the user to verify that address by responding when received. If the response is not received within a predetermined time (475—N), the registration fails (430). On the other hand, if the response is received with the predetermined time (475—Y), thenotification module 230 transmits a “success” notification back to thedevice 300 in order to complete the registration. - The above description of the exemplary method is for illustrative purposes and can be modified in accordance with any of the functionality previously described with respect to the
inmate calling platform 200 and/or thedevice 300. - Method of Calling an Outside Party
-
FIG. 5 illustrates a flowchart diagram of a method for processing an outgoing call by an inmate at an inmate calling platform. In an embodiment, the call is processed by theinmate calling platform 200. - In the method, an inmate of the controlled facility initiates call (505) by dialing a number to an outside (called) party. Initially, the
inmate calling platform 200 determines if the dialed number is on a block list associated with the inmate (515). If the number is blocked (515—Y), theinmate calling platform 200 terminates the call (580). If the number is not on the block list (515—N), theinmate calling platform 200 determines if the dialed number is associated with a device, such as device 300 (525). - In an embodiment, if it is determined that number is not associated with a device, such as device 300 (525—N), the
inmate calling platform 200 processes the call as normal. For example, theinmate calling platform 200 calls therecipient 530 and prompts for acceptance of the call. If the call is accepted by the called party (535—Y), theinmate calling platform 200 connects the called party to the inmate. On the other hand, if the call is rejected by the called party (535—N), the inmate calling platform terminates thecall 540. - If the
inmate calling platform 200 determines that the number is associated with a device, such as device 300 (525—Y), theinmate calling platform 200 checks to determine whether the called number is registered with the system (555). If it is determined that the called number is not registered (555—N), theinmate calling platform 200 forwards registration information to the called party (560) and terminates the call (580). The registration information can be forwarded by email or other electronic message, by a pre-recorded voice message, or other suitable method. - If the called number is registered with the inmate calling platform 200 (555—Y), the
inmate calling platform 200 sends a call notification to thedevice 300. Theinmate calling platform 200 then checks whether the PIN (or other personal verification information) has been received (575). If the PIN is not received within a predetermined time, or does not match the registered PIN (575—N), theinmate calling platform 200 terminates the call. Alternatively, if the PIN is received within the predetermined time and matches the registered PIN (575—Y), theinmate calling platform 200 processes the call by connecting the inmate to the called party. - As discussed above, in an embodiment, the
inmate calling platform 200 processes all calls in accordance with the registration process. In other words, all called numbers are checked for registration in order to process the calls. This omits steps (525)-(550) from the method described above. - The above description of the exemplary method is for illustrative purposes and can be modified in accordance with any of the functionality previously described with respect to the
inmate calling platform 200 and/or thedevice 300. - Method of Processing a Call
-
FIG. 6 illustrates a flowchart diagram of a method for processing call acceptance and authentication by a called party. In an embodiment, portions of the method are performed by theinmate calling platform 200 and thedevice 300. In an embodiment, thedevice 300 is a cellular telephone. - Upon the call being initiated by an inmate, the
inmate calling platform 200 transmits a call notification to the device 300 (605). Thedevice 300 prompts the user to either accept or reject the incoming call (610). If the call is rejected (625—N), thedevice 300 further prompts the user as to whether he would like to block future calls from the inmate (620). If the user indicates that they would like future calls blocked (620—Y), thedevice 300 transmits a “block” notification back to theinmate calling platform 200 indicating that the number associated with thedevice 300 should be added to the inmate's block list (630). In that case, theinmate calling platform 200 will add the number to the block list (625) and terminate the call. Alternatively, if the user responds that he does not wish to block future calls (620—N), then thedevice 300 issues a “reject” notification (622), which causes the inmate calling platform to simply terminate the call (615). - If the user accepts the call (625—Y), the
device 300 next prompts the user for his PIN or other personal verification information (640). Upon entry of the PIN, thedevice 300 authenticates the user by comparing the entered PIN to a previously stored PIN (645). If the PIN authentication fails (645—N), thedevice 300 reprompts (640) the user a predetermined number of times before terminating the call. If the PIN authentication is successful (645—Y), thedevice 300 issues an “accept” notification to theinmate calling platform 200. - Upon receiving the accept notification (and optionally also receiving personal verification information for independently verifying the user's identity), the
inmate calling platform 200 transmits a “conditions” notification (655) to thedevice 300 setting forth the conditions that must be met in order to avoid call interruption/termination. Theinmate calling platform 200 then forwards the inmate's call to the device 300 (665). - The
device 300 processes the conditions (660) and monitors their satisfaction while processing the call (670) between the inmate and the device user. - The above description of the exemplary method is for illustrative purposes and can be modified in accordance with any of the functionality previously described with respect to the
inmate calling platform 200 and/or thedevice 300. - It is to be appreciated that the Detailed Description section, and not the Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, and thus, is not intended to limit the disclosure and the appended claims in any way.
- The invention has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof. The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
- It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the disclosure. Thus, the invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
Claims (20)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/267,383 US20150319612A1 (en) | 2014-05-01 | 2014-05-01 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US15/288,380 US9699304B1 (en) | 2014-05-01 | 2016-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,315 US20170041788A1 (en) | 2014-05-01 | 2016-10-20 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US15/299,303 US10462285B2 (en) | 2014-05-01 | 2016-10-20 | System and method for authenticating called parties of individuals within a controlled environment |
US16/595,018 US10819704B2 (en) | 2014-05-01 | 2019-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US17/078,959 US11563734B2 (en) | 2014-05-01 | 2020-10-23 | System and method for authenticating called parties of individuals within a controlled environment |
US18/098,861 US20230231843A1 (en) | 2014-05-01 | 2023-01-19 | System and method for authenticating called parties of individuals within a controlled environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/267,383 US20150319612A1 (en) | 2014-05-01 | 2014-05-01 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
Related Child Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/288,380 Continuation US9699304B1 (en) | 2014-05-01 | 2016-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,303 Continuation US10462285B2 (en) | 2014-05-01 | 2016-10-20 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,315 Continuation US20170041788A1 (en) | 2014-05-01 | 2016-10-20 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150319612A1 true US20150319612A1 (en) | 2015-11-05 |
Family
ID=54356219
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/267,383 Abandoned US20150319612A1 (en) | 2014-05-01 | 2014-05-01 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US15/288,380 Active US9699304B1 (en) | 2014-05-01 | 2016-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,303 Active US10462285B2 (en) | 2014-05-01 | 2016-10-20 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,315 Abandoned US20170041788A1 (en) | 2014-05-01 | 2016-10-20 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US16/595,018 Active US10819704B2 (en) | 2014-05-01 | 2019-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US17/078,959 Active US11563734B2 (en) | 2014-05-01 | 2020-10-23 | System and method for authenticating called parties of individuals within a controlled environment |
US18/098,861 Pending US20230231843A1 (en) | 2014-05-01 | 2023-01-19 | System and method for authenticating called parties of individuals within a controlled environment |
Family Applications After (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/288,380 Active US9699304B1 (en) | 2014-05-01 | 2016-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,303 Active US10462285B2 (en) | 2014-05-01 | 2016-10-20 | System and method for authenticating called parties of individuals within a controlled environment |
US15/299,315 Abandoned US20170041788A1 (en) | 2014-05-01 | 2016-10-20 | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US16/595,018 Active US10819704B2 (en) | 2014-05-01 | 2019-10-07 | System and method for authenticating called parties of individuals within a controlled environment |
US17/078,959 Active US11563734B2 (en) | 2014-05-01 | 2020-10-23 | System and method for authenticating called parties of individuals within a controlled environment |
US18/098,861 Pending US20230231843A1 (en) | 2014-05-01 | 2023-01-19 | System and method for authenticating called parties of individuals within a controlled environment |
Country Status (1)
Country | Link |
---|---|
US (7) | US20150319612A1 (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9420094B1 (en) * | 2015-10-01 | 2016-08-16 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US9699304B1 (en) | 2014-05-01 | 2017-07-04 | Global Tel*Link Corp. | System and method for authenticating called parties of individuals within a controlled environment |
US9826003B1 (en) * | 2016-11-01 | 2017-11-21 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US10063692B2 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10063700B1 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10063694B1 (en) | 2016-12-23 | 2018-08-28 | Global Tel*Link Corporation | System and method for multilingual authentication access to communication system in controlled environment |
US10063698B2 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10084909B2 (en) | 2007-09-26 | 2018-09-25 | Dsi-Iti, Llc | System and method for controlling free phone calls through an institutional phone system |
US10091350B2 (en) | 2015-11-19 | 2018-10-02 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US10129397B1 (en) | 2015-10-01 | 2018-11-13 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10205826B1 (en) | 2015-10-01 | 2019-02-12 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10270905B1 (en) | 2015-10-01 | 2019-04-23 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10270906B1 (en) | 2015-10-01 | 2019-04-23 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US20190149766A1 (en) * | 2016-10-27 | 2019-05-16 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US10484648B1 (en) | 2019-03-21 | 2019-11-19 | Securus Technologies, Inc. | Inbound calls to controlled-environment facility resident telephone numbers |
US10708419B1 (en) | 2019-06-17 | 2020-07-07 | Chris Talbot | Method and system for rating multiple call destination types from a single video relay kiosk in a corrections facility |
CN112367319A (en) * | 2020-11-09 | 2021-02-12 | 新疆西北星信息技术有限责任公司 | Communication management platform for prison family telephone integration |
US12101359B1 (en) * | 2016-11-01 | 2024-09-24 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9843448B1 (en) * | 2017-06-07 | 2017-12-12 | Global Tel*Link Corporation | System and method for customizing inmate communication notification |
US20220237629A1 (en) * | 2021-01-28 | 2022-07-28 | Capital One Services, Llc | System, method, and computer-accessible medium for determining the veracity of a bank fraud call |
Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040213396A1 (en) * | 2003-04-25 | 2004-10-28 | Macnamara John J. | Methods for blocking repeated occurrences of nuisance calls |
US20050043014A1 (en) * | 2002-08-08 | 2005-02-24 | Hodge Stephen L. | Telecommunication call management and monitoring system with voiceprint verification |
US7158621B2 (en) * | 2002-04-20 | 2007-01-02 | Bayne Anthony J | Pre-paid calling and voice messaging services for inmates |
US20070049248A1 (en) * | 2005-08-25 | 2007-03-01 | International Business Machines Corporation | Method for remotely connecting to a secure telephone network |
US20070071206A1 (en) * | 2005-06-24 | 2007-03-29 | Gainsboro Jay L | Multi-party conversation analyzer & logger |
US20070140448A1 (en) * | 2002-09-30 | 2007-06-21 | Lin Geoffrey S | System and Method for Monitoring and Handling Telecommunication Activity Via A Computer Network |
US7305090B1 (en) * | 2003-09-12 | 2007-12-04 | Sprint Spectrum L.P. | Method and system for use of common provisioning data to activate cellular wireless devices |
US20080102746A1 (en) * | 2006-10-26 | 2008-05-01 | Erick Simon Amador | Method and system for transferring a designated call to a cellular telephone |
US20080304438A1 (en) * | 2004-10-01 | 2008-12-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Apparatus for Multimedia Communication |
US20090042541A1 (en) * | 2007-08-10 | 2009-02-12 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Mobile communication device and mobile communication system and method using same |
US20090281904A1 (en) * | 2008-04-02 | 2009-11-12 | Pharris Dennis J | Mobile telephone transaction systems and methods |
US20100111274A1 (en) * | 2008-11-03 | 2010-05-06 | Anthony Jeremiah Bayne | Controlled three way calling |
US8050393B2 (en) * | 2007-05-04 | 2011-11-01 | Confinement Telephony Technology, Llc | Method and apparatus for evaluating possible 3-way call events |
US20120331527A1 (en) * | 2011-06-22 | 2012-12-27 | TerraWi, Inc. | Multi-layer, geolocation-based network resource access and permissions |
US20130194377A1 (en) * | 2012-02-01 | 2013-08-01 | Gary James Humphries | Method and apparatus for providing both audio/video visitation and voip telephonic visitation originated either by an inmate or by an outside visitor directly between inmates of a prison and an outside visitor without need of intervention by prison personnel |
US20130267204A1 (en) * | 2012-02-28 | 2013-10-10 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication based on different device capture modalities |
US8582738B1 (en) * | 2011-01-19 | 2013-11-12 | Securus Technologies, Inc. | Person-to-person calling accounts |
US20140302829A1 (en) * | 2013-04-04 | 2014-10-09 | Samsung Electronics Co., Ltd. | Apparatus and method for providing additional information by using caller phone number |
US20140329514A1 (en) * | 2013-05-01 | 2014-11-06 | MBTE Sweden AB | Concepts for enhanced call control |
US20140378149A1 (en) * | 2013-06-19 | 2014-12-25 | Cellco Partnership D/B/A Verizon Wireless | Maintaining connectivity during call-setup |
US20150229770A1 (en) * | 2014-02-13 | 2015-08-13 | Qualcomm Incorporated | Enhancing Reachability in Internet Protocol Communications |
US20160078281A1 (en) * | 2011-04-18 | 2016-03-17 | Intelmate Llc | Secure communication systems and methods |
US20170134468A1 (en) * | 2013-03-15 | 2017-05-11 | Intelmate Llc | Dynamic voip routing and adjustment |
Family Cites Families (131)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5113430A (en) | 1990-10-01 | 1992-05-12 | United States Advanced Network, Inc. | Enhanced wide area audio response network |
US5274695A (en) | 1991-01-11 | 1993-12-28 | U.S. Sprint Communications Company Limited Partnership | System for verifying the identity of a caller in a telecommunications network |
US5229764A (en) | 1991-06-20 | 1993-07-20 | Matchett Noel D | Continuous biometric authentication matrix |
US5717743A (en) | 1992-12-16 | 1998-02-10 | Texas Instruments Incorporated | Transparent telephone access system using voice authorization |
US5502759A (en) | 1993-05-13 | 1996-03-26 | Nynex Science & Technology, Inc. | Apparatus and accompanying methods for preventing toll fraud through use of centralized caller voice verification |
US5485507A (en) | 1993-08-20 | 1996-01-16 | Gateway Technologies, Inc. | Integrated commissary system |
US5473671A (en) | 1994-03-11 | 1995-12-05 | At&T Corp. | Selective screening of incoming calls for cellular telephone systems |
US7106843B1 (en) | 1994-04-19 | 2006-09-12 | T-Netix, Inc. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US5655013A (en) | 1994-04-19 | 1997-08-05 | Gainsboro; Jay L. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US5926533A (en) | 1994-04-19 | 1999-07-20 | Opus Telecom, Inc. | Computer-based method and apparatus for controlling, monitoring, recording and reporting telephone access |
US5563933A (en) | 1994-11-02 | 1996-10-08 | At&T | Method and apparatus for facilitating the completing of telephone regional toll-free calls from outside the region |
US6052454A (en) | 1996-01-16 | 2000-04-18 | Global Tel*Link Corp. | Telephone apparatus with recording of phone conversations on massive storage |
US5923746A (en) | 1996-09-18 | 1999-07-13 | Rockwell International Corp. | Call recording system and method for use with a telephonic switch |
US6282566B1 (en) | 1997-05-30 | 2001-08-28 | Alcatel Usa Sourcing, L.P. | System and method for a debit card telecom service |
US6213391B1 (en) | 1997-09-10 | 2001-04-10 | William H. Lewis | Portable system for personal identification based upon distinctive characteristics of the user |
US6138030A (en) * | 1997-10-07 | 2000-10-24 | Motorola, Inc. | Communications system for providing multiple services and hold capability of at least one service, and method therefor |
US6084967A (en) | 1997-10-29 | 2000-07-04 | Motorola, Inc. | Radio telecommunication device and method of authenticating a user with a voice authentication token |
US6064963A (en) | 1997-12-17 | 2000-05-16 | Opus Telecom, L.L.C. | Automatic key word or phrase speech recognition for the corrections industry |
US6038666A (en) | 1997-12-22 | 2000-03-14 | Trw Inc. | Remote identity verification technique using a personal identification device |
US6104922A (en) | 1998-03-02 | 2000-08-15 | Motorola, Inc. | User authentication in a communication system utilizing biometric information |
US6160903A (en) | 1998-04-24 | 2000-12-12 | Dew Engineering And Development Limited | Method of providing secure user access |
US6219439B1 (en) | 1998-07-09 | 2001-04-17 | Paul M. Burger | Biometric authentication system |
DE19841166A1 (en) | 1998-09-09 | 2000-03-16 | Deutsche Telekom Ag | Procedure for controlling the access authorization for voice telephony on a landline or mobile phone connection and communication network |
BR9914420B1 (en) | 1998-10-14 | 2012-09-18 | device and process for biometric identification of a person. | |
US6665376B1 (en) | 1998-10-23 | 2003-12-16 | T-Netix, Inc. | Selectively activated integrated real-time recording of telephone conversations with automated documentation of consent to call recording |
US6584183B2 (en) | 1998-11-17 | 2003-06-24 | Charles L. Manto | System and method for providing sponsored of universal telecommunications service and third party payer services |
US6377699B1 (en) | 1998-11-25 | 2002-04-23 | Iridian Technologies, Inc. | Iris imaging telephone security module and method |
US6389397B1 (en) | 1998-12-23 | 2002-05-14 | Lucent Technologies, Inc. | User identification system using improved voice print identification processing |
US20020080751A1 (en) * | 1999-01-13 | 2002-06-27 | Peter Hartmaier | System and method for routing calls in a wireless communication network |
US6219640B1 (en) | 1999-08-06 | 2001-04-17 | International Business Machines Corporation | Methods and apparatus for audio-visual speaker recognition and utterance verification |
JP4139031B2 (en) * | 1999-12-27 | 2008-08-27 | 富士通株式会社 | Caller information display method |
WO2001061610A2 (en) | 2000-02-18 | 2001-08-23 | Walker Digital, Llc | Method and apparatus for conducting or facilitating a promotion |
US6246769B1 (en) | 2000-02-24 | 2001-06-12 | Michael L. Kohut | Authorized user verification by sequential pattern recognition and access code acquisition |
US6574317B1 (en) | 2000-05-08 | 2003-06-03 | Worldcom, Inc. | System and method for blocking uncollectible random traffic of a telecommunication network |
US6950508B1 (en) | 2000-06-28 | 2005-09-27 | Bellsouth Intellectual Property Corp. | System and method for providing an away-from-home calling service |
JP3639194B2 (en) * | 2000-07-27 | 2005-04-20 | 富士通株式会社 | Model change device, model change method, and recording medium recording model change program |
US20020042879A1 (en) | 2000-10-10 | 2002-04-11 | Gould Terry A. | Electronic signature system |
US6819219B1 (en) | 2000-10-13 | 2004-11-16 | International Business Machines Corporation | Method for biometric-based authentication in wireless communication for access control |
US6668045B1 (en) | 2000-10-30 | 2003-12-23 | T-Netix, Inc. | Message screening, delivery and billing system |
US20030161464A1 (en) * | 2000-12-15 | 2003-08-28 | International Business Machines Corporation | On-hold information service with caller-controlled personalized menu |
US6950402B2 (en) * | 2001-02-15 | 2005-09-27 | Persona Software, Inc. | Web-enabled call management method and apparatus |
US6788772B2 (en) | 2001-03-07 | 2004-09-07 | Zvi Barak | System and method for controlling outgoing telephone calls |
US7133662B2 (en) | 2001-05-24 | 2006-11-07 | International Business Machines Corporation | Methods and apparatus for restricting access of a user using a cellular telephone |
US6687733B2 (en) | 2001-06-01 | 2004-02-03 | Intergenix | Method and system for automatically configuring a client-server network |
US20030002639A1 (en) | 2001-07-02 | 2003-01-02 | Huie David L. | Real-time call validation system |
US7899167B1 (en) | 2003-08-15 | 2011-03-01 | Securus Technologies, Inc. | Centralized call processing |
US7136513B2 (en) | 2001-11-08 | 2006-11-14 | Pelco | Security identification system |
US6836540B2 (en) | 2002-04-29 | 2004-12-28 | Evercom Systems, Inc. | Systems and methods for offering a service to a party associated with a blocked call |
US20080000966A1 (en) * | 2006-06-30 | 2008-01-03 | Evercom Systems, Inc. | System and method for electronic visitation registration |
US7494061B2 (en) | 2006-06-30 | 2009-02-24 | Evercom Systems, Inc. | Systems and methods for identity verification using continuous biometric monitoring |
US6810480B1 (en) | 2002-10-21 | 2004-10-26 | Sprint Communications Company L.P. | Verification of identity and continued presence of computer users |
US7222072B2 (en) | 2003-02-13 | 2007-05-22 | Sbc Properties, L.P. | Bio-phonetic multi-phrase speaker identity verification |
US20050123111A1 (en) | 2003-07-21 | 2005-06-09 | Brendan Philbin | Method and system to process a request for communication between a calling device and a called device |
US7529357B1 (en) | 2003-08-15 | 2009-05-05 | Evercom Systems, Inc. | Inmate management and call processing systems and methods |
US7480241B2 (en) | 2003-09-02 | 2009-01-20 | Arris International, Inc. | Method for processor overload control in a voice over internet protocol cable modem termination system |
US7278028B1 (en) | 2003-11-05 | 2007-10-02 | Evercom Systems, Inc. | Systems and methods for cross-hatching biometrics with other identifying data |
US20050102371A1 (en) | 2003-11-07 | 2005-05-12 | Emre Aksu | Streaming from a server to a client |
US7551732B2 (en) | 2003-12-08 | 2009-06-23 | Global Tel*Link Corporation | Centralized voice over IP recording and retrieval method and apparatus |
US20050123113A1 (en) | 2003-12-09 | 2005-06-09 | Douglas Horn | Internet lockout device |
EP1571813A1 (en) * | 2004-03-02 | 2005-09-07 | LG Electronics, Inc. | Method and communication system for transmitting an image to the called party identifying calling party |
US9014355B2 (en) * | 2004-04-27 | 2015-04-21 | Value-Added Communications, Inc. | Telecommunication revenue management system |
US8031849B1 (en) | 2004-09-03 | 2011-10-04 | Confinement Telephony Technology, Llc | Telephony system and method with enhanced fraud control |
US7505573B2 (en) | 2005-05-02 | 2009-03-17 | Sbc Knowledge Ventures, L.P. | Inmate called party prepaid card method and system |
US8676162B2 (en) * | 2005-05-24 | 2014-03-18 | Marshall Feature Recognition Llc | Remote subscriber identification (RSID) system and method |
US8185583B2 (en) * | 2005-06-03 | 2012-05-22 | Siemens Enterprise Communications, Inc. | Visualization enhanced presence system |
KR100754176B1 (en) * | 2005-06-08 | 2007-09-03 | 삼성전자주식회사 | Transmission list saving method in MFP and the MFP having the same function |
US7848510B2 (en) | 2005-07-22 | 2010-12-07 | Cisco Technology, Inc. | Method and system for recording automatic call distributor calls |
US8428238B2 (en) | 2005-08-03 | 2013-04-23 | Cisco Technology, Inc. | System and method for ensuring call privacy in a shared telephone environment |
US20070047734A1 (en) | 2005-08-26 | 2007-03-01 | Sbc Knowledge Ventures, L.P. | Inmate telephone absent an inmate-accessible hook switch button |
KR100663477B1 (en) * | 2005-12-23 | 2007-01-02 | 삼성전자주식회사 | Apparatus and method for providing receiving/sending information |
US8208764B2 (en) | 2006-01-21 | 2012-06-26 | Elizabeth Guckenberger | Photo automatic linking system and method for accessing, linking, and visualizing “key-face” and/or multiple similar facial images along with associated electronic data via a facial image recognition search engine |
US8019354B2 (en) * | 2006-02-17 | 2011-09-13 | Securus Technologies, Inc. | Wireless communications control in a controlled environment facility |
CN101056339B (en) * | 2006-11-06 | 2011-06-08 | 华为技术有限公司 | Method, system and device for mutual conversion between the ring back tone and ringing tone |
TWI413400B (en) | 2006-12-13 | 2013-10-21 | Htc Corp | Methods and systems for screening incoming calls, and machine readable medium thereof |
JP4355815B2 (en) * | 2007-04-04 | 2009-11-04 | シャープ株式会社 | Image processing device |
US20090046839A1 (en) | 2007-08-15 | 2009-02-19 | Alcatel Lucent | Verifying authenticity of called party in telephony networks |
US20090060161A1 (en) | 2007-08-29 | 2009-03-05 | Inmate Calling Solutions Llc D/B/A Icsolutions | Method and system to automatically block a telephone number |
US20100197293A1 (en) | 2007-09-20 | 2010-08-05 | A.D.V. Communications Ltd. | Remote computer access authentication using a mobile device |
US8295457B2 (en) | 2007-09-26 | 2012-10-23 | Dsi-Iti, Llc | System and method for controlling free phone calls through an institutional phone system |
US11811966B2 (en) * | 2007-10-17 | 2023-11-07 | First Orion Corp. | IP-enabled information delivery |
US8132265B2 (en) | 2008-03-19 | 2012-03-06 | Novell, Inc. | Techniques for multilingual password challenge response, password reset, and/or password recovery |
CA2820983C (en) * | 2008-05-18 | 2019-02-05 | Google Inc. | Secured electronic transaction system |
US8358759B2 (en) * | 2008-11-18 | 2013-01-22 | At&T Intellectual Property Ii, L.P. | Biometric identification in communication |
JP5332544B2 (en) * | 2008-11-21 | 2013-11-06 | 富士通株式会社 | Call control device, call control system, call control method, and computer program |
US20100151820A1 (en) | 2008-12-15 | 2010-06-17 | At&T Mobility Ii Llc | Devices, Systems and Methods for Localized and Controlled Telephone Service |
US9621714B2 (en) | 2009-01-27 | 2017-04-11 | Value-Added Communications, Inc. | System and method for electronic notification in institutional communication |
US8494144B2 (en) | 2009-02-12 | 2013-07-23 | Global Tel*Link Corporation | System and method for controlled call handling |
US20110077022A1 (en) | 2009-09-23 | 2011-03-31 | Kim Robert Scovill | Carrier based in-network location triggered managed processing of wireless communications |
US8914025B2 (en) * | 2010-01-15 | 2014-12-16 | Apple Inc. | Registration with a mobile telecommunications service provider |
US20110196753A1 (en) | 2010-02-09 | 2011-08-11 | Brian Joseph Hodgdon | System and method for immediate issuance of an activated prepaid card with improved security measures |
US9049292B2 (en) * | 2010-02-25 | 2015-06-02 | Cisco Technology, Inc. | Authentication to facilitate communication with roaming devices |
US8654934B2 (en) * | 2010-04-21 | 2014-02-18 | Angel.Com Incorporated | Multimodal interactive voice response system |
US8832810B2 (en) | 2010-07-09 | 2014-09-09 | At&T Intellectual Property I, L.P. | Methods, systems, and products for authenticating users |
US9800721B2 (en) | 2010-09-07 | 2017-10-24 | Securus Technologies, Inc. | Multi-party conversation analyzer and logger |
KR20120027775A (en) * | 2010-09-13 | 2012-03-22 | 주식회사 케이티 | Method and apparatus for providing call connection notification |
US20120072975A1 (en) | 2010-09-21 | 2012-03-22 | Certicom Corp. | Circumstantial Authentication |
US10042993B2 (en) | 2010-11-02 | 2018-08-07 | Homayoon Beigi | Access control through multifactor authentication with multimodal biometrics |
US9501882B2 (en) * | 2010-11-23 | 2016-11-22 | Morphotrust Usa, Llc | System and method to streamline identity verification at airports and beyond |
US20120295601A1 (en) * | 2010-12-16 | 2012-11-22 | Alexander Lang | System and Method for Providing a Mobile Phone Directory Service |
US8761730B2 (en) * | 2011-02-16 | 2014-06-24 | Sony Corporation | Display processing apparatus |
EP2515497B1 (en) * | 2011-04-18 | 2018-07-04 | Werner Blessing | Method for performing authentication in a distributed authentication system and authentication system |
US9030292B2 (en) | 2011-04-18 | 2015-05-12 | Telmate, Llc | Interactive audio/video system and device for use in a secure facility |
US8648894B2 (en) | 2011-05-04 | 2014-02-11 | Eyconix, Llc | Virtual inmate visitation |
US9455982B2 (en) | 2011-05-20 | 2016-09-27 | Steve Smith | Identification authentication in a communications network |
CN102270296A (en) * | 2011-07-05 | 2011-12-07 | 上海合合信息科技发展有限公司 | Business card information exchanging method based on character recognition and image matching |
CN102333277B (en) * | 2011-07-29 | 2014-08-06 | 上海合合信息科技发展有限公司 | Electronic name card transmitting method and system combining geographical position information and Bluetooth technology |
US8917306B2 (en) | 2011-07-29 | 2014-12-23 | Cisco Technology, Inc. | Previewing video data in a video communication environment |
CA2788373C (en) | 2011-09-01 | 2019-10-22 | Telmate Llc | Personal allowed number system |
EP2595122A1 (en) * | 2011-11-15 | 2013-05-22 | Gemalto SA | Method for enrolling and authenticating a cardholder |
US9106789B1 (en) | 2012-01-20 | 2015-08-11 | Tech Friends, Inc. | Videoconference and video visitation security |
JP5876747B2 (en) * | 2012-02-23 | 2016-03-02 | シャープ株式会社 | COMMUNICATION TERMINAL DEVICE, CONTROL METHOD, PROGRAM, AND RECORDING MEDIUM |
US20140104429A1 (en) | 2012-07-13 | 2014-04-17 | Argyle Security, Inc. | Correctional facility access and security apparatus, systems, and methods |
US9426303B1 (en) * | 2012-08-03 | 2016-08-23 | Securus Technologies, Inc. | Location based services for controlled-environment facilities |
US20190050634A1 (en) * | 2012-08-06 | 2019-02-14 | Cloudparc, Inc. | Tolling with vehicle tracking |
JP6043545B2 (en) * | 2012-08-24 | 2016-12-14 | 京セラ株式会社 | Mobile terminal device, program, and control method for mobile terminal device |
US9208676B2 (en) | 2013-03-14 | 2015-12-08 | Google Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
KR101480594B1 (en) * | 2012-12-18 | 2015-01-08 | 현대자동차주식회사 | Method for controlling termination call based on gaze, and mobile communication terminal therefor |
US8813134B2 (en) * | 2012-12-20 | 2014-08-19 | Verizon Patent And Licensing Inc. | Mobile device caller ID to smart TV devices |
US9269224B2 (en) * | 2013-03-11 | 2016-02-23 | Cfph, Llc | Devices for gaming |
US20140278212A1 (en) | 2013-03-15 | 2014-09-18 | Telmate Llc | Location-based tracking system |
US9020115B2 (en) | 2013-05-09 | 2015-04-28 | Hank Technology Llc | Inmate communications |
US20160125343A1 (en) | 2013-05-10 | 2016-05-05 | Yp-It Ltd | System and Method for Providing Secure Remote Access to Computer-Based Work |
US9235943B2 (en) | 2013-07-26 | 2016-01-12 | Joseph Frank Scalisi | Remote identity verification of lodging guests |
US9654952B2 (en) * | 2013-08-12 | 2017-05-16 | Verizon Patent And Licensing Inc. | Personal emergency message framework |
US9396730B2 (en) | 2013-09-30 | 2016-07-19 | Bank Of America Corporation | Customer identification through voice biometrics |
WO2015130700A1 (en) | 2014-02-26 | 2015-09-03 | Secureauth Corporation | Security object creation, validation, and assertion for single sign on authentication |
US20150319612A1 (en) | 2014-05-01 | 2015-11-05 | Global Tel*Link Corp. | System and Method for Authenticating Called Parties of Individuals Within a Controlled Environment |
US8929525B1 (en) | 2014-07-03 | 2015-01-06 | Securus Technologies, Inc. | On-demand video communication for controlled-environment facility residents |
US9769310B2 (en) | 2015-11-19 | 2017-09-19 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US20170294063A1 (en) | 2016-04-11 | 2017-10-12 | Global Tel*Link Corp. | Access prevention and control for security systems |
US9794399B1 (en) | 2016-12-23 | 2017-10-17 | Global Tel*Link Corporation | System and method for multilingual authentication access to communication system in controlled environment |
-
2014
- 2014-05-01 US US14/267,383 patent/US20150319612A1/en not_active Abandoned
-
2016
- 2016-10-07 US US15/288,380 patent/US9699304B1/en active Active
- 2016-10-20 US US15/299,303 patent/US10462285B2/en active Active
- 2016-10-20 US US15/299,315 patent/US20170041788A1/en not_active Abandoned
-
2019
- 2019-10-07 US US16/595,018 patent/US10819704B2/en active Active
-
2020
- 2020-10-23 US US17/078,959 patent/US11563734B2/en active Active
-
2023
- 2023-01-19 US US18/098,861 patent/US20230231843A1/en active Pending
Patent Citations (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7158621B2 (en) * | 2002-04-20 | 2007-01-02 | Bayne Anthony J | Pre-paid calling and voice messaging services for inmates |
US20050043014A1 (en) * | 2002-08-08 | 2005-02-24 | Hodge Stephen L. | Telecommunication call management and monitoring system with voiceprint verification |
US20070140448A1 (en) * | 2002-09-30 | 2007-06-21 | Lin Geoffrey S | System and Method for Monitoring and Handling Telecommunication Activity Via A Computer Network |
US20040213396A1 (en) * | 2003-04-25 | 2004-10-28 | Macnamara John J. | Methods for blocking repeated occurrences of nuisance calls |
US7305090B1 (en) * | 2003-09-12 | 2007-12-04 | Sprint Spectrum L.P. | Method and system for use of common provisioning data to activate cellular wireless devices |
US20080304438A1 (en) * | 2004-10-01 | 2008-12-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Apparatus for Multimedia Communication |
US20070071206A1 (en) * | 2005-06-24 | 2007-03-29 | Gainsboro Jay L | Multi-party conversation analyzer & logger |
US20070049248A1 (en) * | 2005-08-25 | 2007-03-01 | International Business Machines Corporation | Method for remotely connecting to a secure telephone network |
US20080102746A1 (en) * | 2006-10-26 | 2008-05-01 | Erick Simon Amador | Method and system for transferring a designated call to a cellular telephone |
US8050393B2 (en) * | 2007-05-04 | 2011-11-01 | Confinement Telephony Technology, Llc | Method and apparatus for evaluating possible 3-way call events |
US20090042541A1 (en) * | 2007-08-10 | 2009-02-12 | Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd. | Mobile communication device and mobile communication system and method using same |
US20090281904A1 (en) * | 2008-04-02 | 2009-11-12 | Pharris Dennis J | Mobile telephone transaction systems and methods |
US20100111274A1 (en) * | 2008-11-03 | 2010-05-06 | Anthony Jeremiah Bayne | Controlled three way calling |
US8582738B1 (en) * | 2011-01-19 | 2013-11-12 | Securus Technologies, Inc. | Person-to-person calling accounts |
US20160078281A1 (en) * | 2011-04-18 | 2016-03-17 | Intelmate Llc | Secure communication systems and methods |
US20120331527A1 (en) * | 2011-06-22 | 2012-12-27 | TerraWi, Inc. | Multi-layer, geolocation-based network resource access and permissions |
US20130194377A1 (en) * | 2012-02-01 | 2013-08-01 | Gary James Humphries | Method and apparatus for providing both audio/video visitation and voip telephonic visitation originated either by an inmate or by an outside visitor directly between inmates of a prison and an outside visitor without need of intervention by prison personnel |
US20130267204A1 (en) * | 2012-02-28 | 2013-10-10 | Verizon Patent And Licensing Inc. | Method and system for multi-factor biometric authentication based on different device capture modalities |
US20170134468A1 (en) * | 2013-03-15 | 2017-05-11 | Intelmate Llc | Dynamic voip routing and adjustment |
US20140302829A1 (en) * | 2013-04-04 | 2014-10-09 | Samsung Electronics Co., Ltd. | Apparatus and method for providing additional information by using caller phone number |
US20140329514A1 (en) * | 2013-05-01 | 2014-11-06 | MBTE Sweden AB | Concepts for enhanced call control |
US20140378149A1 (en) * | 2013-06-19 | 2014-12-25 | Cellco Partnership D/B/A Verizon Wireless | Maintaining connectivity during call-setup |
US20150229770A1 (en) * | 2014-02-13 | 2015-08-13 | Qualcomm Incorporated | Enhancing Reachability in Internet Protocol Communications |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10084909B2 (en) | 2007-09-26 | 2018-09-25 | Dsi-Iti, Llc | System and method for controlling free phone calls through an institutional phone system |
US10462285B2 (en) | 2014-05-01 | 2019-10-29 | Global Tel*Link Corp. | System and method for authenticating called parties of individuals within a controlled environment |
US11563734B2 (en) | 2014-05-01 | 2023-01-24 | Global Tel*Link Corporation | System and method for authenticating called parties of individuals within a controlled environment |
US10819704B2 (en) | 2014-05-01 | 2020-10-27 | Global Tel*Link Corporation | System and method for authenticating called parties of individuals within a controlled environment |
US9699304B1 (en) | 2014-05-01 | 2017-07-04 | Global Tel*Link Corp. | System and method for authenticating called parties of individuals within a controlled environment |
US10270906B1 (en) | 2015-10-01 | 2019-04-23 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10205826B1 (en) | 2015-10-01 | 2019-02-12 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10063700B1 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10063698B2 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US9420094B1 (en) * | 2015-10-01 | 2016-08-16 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10455084B2 (en) | 2015-10-01 | 2019-10-22 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10129397B1 (en) | 2015-10-01 | 2018-11-13 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10063692B2 (en) | 2015-10-01 | 2018-08-28 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10270905B1 (en) | 2015-10-01 | 2019-04-23 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US9742910B2 (en) | 2015-10-01 | 2017-08-22 | Securus Technologies, Inc. | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices |
US10917517B2 (en) | 2015-11-19 | 2021-02-09 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US10594858B2 (en) | 2015-11-19 | 2020-03-17 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US11895265B2 (en) | 2015-11-19 | 2024-02-06 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US10091350B2 (en) | 2015-11-19 | 2018-10-02 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US11336765B2 (en) | 2015-11-19 | 2022-05-17 | Global Tel*Link Corporation | Authentication and control of incoming communication |
US10887547B2 (en) * | 2016-10-27 | 2021-01-05 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US20190149766A1 (en) * | 2016-10-27 | 2019-05-16 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US20200145612A1 (en) * | 2016-10-27 | 2020-05-07 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US11611721B2 (en) | 2016-10-27 | 2023-03-21 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US10531041B2 (en) * | 2016-10-27 | 2020-01-07 | Chris Talbot | Method and system for providing a visual indication that a video relay service call originates from an inmate at a corrections facility |
US11075964B1 (en) * | 2016-11-01 | 2021-07-27 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US10412125B2 (en) * | 2016-11-01 | 2019-09-10 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US20180124125A1 (en) * | 2016-11-01 | 2018-05-03 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US10728290B1 (en) * | 2016-11-01 | 2020-07-28 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US9826003B1 (en) * | 2016-11-01 | 2017-11-21 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US12101359B1 (en) * | 2016-11-01 | 2024-09-24 | Confinement Telephony Technology, Llc | Devices with calling apps for inmate calls, information sharing, monitoring, and other functions |
US10063694B1 (en) | 2016-12-23 | 2018-08-28 | Global Tel*Link Corporation | System and method for multilingual authentication access to communication system in controlled environment |
US10897597B1 (en) | 2019-03-21 | 2021-01-19 | Securus Technologies, Llc | Inbound calls to controlled-environment facility resident telephone numbers |
US10484648B1 (en) | 2019-03-21 | 2019-11-19 | Securus Technologies, Inc. | Inbound calls to controlled-environment facility resident telephone numbers |
US10708419B1 (en) | 2019-06-17 | 2020-07-07 | Chris Talbot | Method and system for rating multiple call destination types from a single video relay kiosk in a corrections facility |
CN112367319A (en) * | 2020-11-09 | 2021-02-12 | 新疆西北星信息技术有限责任公司 | Communication management platform for prison family telephone integration |
Also Published As
Publication number | Publication date |
---|---|
US11563734B2 (en) | 2023-01-24 |
US20170041788A1 (en) | 2017-02-09 |
US10819704B2 (en) | 2020-10-27 |
US20170041787A1 (en) | 2017-02-09 |
US20230231843A1 (en) | 2023-07-20 |
US20210112046A1 (en) | 2021-04-15 |
US20200036832A1 (en) | 2020-01-30 |
US9699304B1 (en) | 2017-07-04 |
US10462285B2 (en) | 2019-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11563734B2 (en) | System and method for authenticating called parties of individuals within a controlled environment | |
US11856132B2 (en) | Validating automatic number identification data | |
US20220337700A1 (en) | Authentication and control of incoming communication | |
US8646051B2 (en) | Automated password reset via an interactive voice response system | |
US9742910B2 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
US8151328B1 (en) | Accessing secure network areas by utilizing mobile-device authentication | |
US9232051B2 (en) | Call management for secure facilities | |
US9392456B2 (en) | Call center SMS verification system and method | |
US20170251100A1 (en) | Inbound Calls to Intelligent Controlled-Environment Facility Resident Media and/or Communications Devices | |
JP2006038955A (en) | Voiceprint recognition system | |
GB2492312A (en) | Authorising a transaction | |
JP2010109619A (en) | Authentication device, authentication method, and program | |
KR20130048695A (en) | An authentication system, authentication method and authentication server | |
JP2002229951A (en) | Person identification system | |
US9684782B2 (en) | System for processing lost password using password long-term memory of user, and method for processing lost password | |
US10205826B1 (en) | Inbound calls to intelligent controlled-environment facility resident media and/or communications devices | |
CN103782564A (en) | Authentication system and method therefor | |
KR101793958B1 (en) | Method for Preventing Voice Phishing by using Qualified Caller Information | |
US10547603B2 (en) | Secure call answering | |
JP4497023B2 (en) | Network system and communication terminal used therefor | |
KR102204416B1 (en) | Authentication service method based on voice | |
TWI548259B (en) | Method and system for privacy call | |
JP2012208861A (en) | Portable terminal, authentication system, and authentication method | |
KR20120005593A (en) | System and method for user authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GLOBAL TEL*LINK CORP., VIRGINIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HODGE, STEPHEN;REEL/FRAME:032809/0691 Effective date: 20140430 |
|
AS | Assignment |
Owner name: DSI-ITI, LLC, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0287 Effective date: 20181129 Owner name: GLOBAL TEL*LINK CORPORATION, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0260 Effective date: 20181129 Owner name: VALUE-ADDED COMMUNICATIONS, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0260 Effective date: 20181129 Owner name: GLOBAL TEL*LINK CORPORATION, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0287 Effective date: 20181129 Owner name: DSI-ITI, LLC, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0260 Effective date: 20181129 Owner name: VALUE-ADDED COMMUNICATIONS, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0287 Effective date: 20181129 Owner name: GLOBAL TEL*LINK CORPORATION, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0913 Effective date: 20181129 Owner name: DSI-ITI, LLC, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0913 Effective date: 20181129 Owner name: VALUE-ADDED COMMUNICATIONS, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047687/0913 Effective date: 20181129 Owner name: DSI-ITI, LLC, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047692/0815 Effective date: 20181129 Owner name: GLOBAL TEL*LINK CORPORATION, VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047692/0815 Effective date: 20181129 Owner name: VALUE-ADDED COMMUNICATIONS, INC., VIRGINIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:047692/0815 Effective date: 20181129 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:048788/0014 Effective date: 20181129 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:GLOBAL TEL*LINK CORPORATION;DSI-ITI, INC.;VALUE-ADDED COMMUNICATIONS, INC.;AND OTHERS;REEL/FRAME:047720/0576 Effective date: 20181129 |