System and method for identity verification in a detention environment
First Claim
Patent Images
1. A method of identifying a first individual attempting to interact with a second individual, wherein the first individual is not associated with a detention environment and the second individual being associated with the detention environment, said method comprising:
- storing identity information of the first individual from a data source into a centralized database, the centralized database being accessible by disparate interactions related to the detention environment;
receiving identity information from the first individual when attempting to interact with the second individual;
verifying the first individual by comparing the received identity information to the stored identity information in the centralized database; and
allowing the interaction between the first individual and the second individual only when there is a match between the received identity information and the stored identity information,wherein the data source is at least one of a line information database, a best known name and address database, social security database, national financial information database, national passport database, government issued identification database, warrants database, national victim network database, or “
do not contact”
database.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identity verification in a detention environment and for tracking information between individuals in a detention environment with individuals who are not in the detention environment across disparate functional systems.
88 Citations
18 Claims
-
1. A method of identifying a first individual attempting to interact with a second individual, wherein the first individual is not associated with a detention environment and the second individual being associated with the detention environment, said method comprising:
-
storing identity information of the first individual from a data source into a centralized database, the centralized database being accessible by disparate interactions related to the detention environment; receiving identity information from the first individual when attempting to interact with the second individual; verifying the first individual by comparing the received identity information to the stored identity information in the centralized database; and allowing the interaction between the first individual and the second individual only when there is a match between the received identity information and the stored identity information, wherein the data source is at least one of a line information database, a best known name and address database, social security database, national financial information database, national passport database, government issued identification database, warrants database, national victim network database, or “
do not contact”
database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for identifying a first individual attempting to interact with a second individual, wherein the first individual is not associated with a detention environment and the second individual being associated with the detention environment, said system comprising:
-
a centralized database to store identity information of the first individual from a data source, the centralized database being accessible by disparate systems related to the detention environment; an input receiver that receives identity information from the first individual when attempting to interact with the second individual; and a verification system that compares the received identity information to the stored identity information in the centralized database and allows the interaction between the first individual and the second individual only when there is a match between the received identity information and the stored identity information, wherein the data source is at least one of a line information database, a best known name and address database, social security database, national financial information database, national passport database, government issued identification database, warrants database, national victim network database, or “
do not contact”
database. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification