System and method for visitation management in a controlled environment
First Claim
1. A visitation management system for allowing a visit participant to visit with an inmate of a controlled environment facility, the visitation management system comprising:
- an authentication subsystem that includes;
a database that stores identifying information of the visit participant;
an identification number system configured to assign a globally-unique identification number to the visit participant;
a biometric input device configured to capture biometric information of a purported visit participant; and
an authenticator configured to compare the captured biometric information of the purported visit participant to biometric information of the visit participant stored in the database, and to authenticate or decline the purported visit participant based on the comparison;
a visit scheduling subsystem that includes;
a scheduling database that stores schedule information of visitation sites, as well as of the inmate, each item of schedule information including a link that provides additional information when activated;
an interface unit that is configured to provide the schedule information to the visit participant, and receive a visit slot selection from the visit participant, wherein the visit scheduling subsystem updates the schedule information based on the visit slot selection; and
a visit monitoring subsystem that includes;
a server configured to receive audio and/or video data of the visit in real-time;
a monitoring station configured to monitor the received audio and/or video data, to detect a violation of a predetermined rule, and to analyze the received audio and/or video data for one or more of a hook-flash event or a DTMF input for purposes of detecting an unauthorized three-way call attempt.
7 Assignments
0 Petitions
Accused Products
Abstract
A system is described herein that facilitates the easy scheduling and conducting of prison visitations. The system provides a remotely-accessible means for visitors to authenticate themselves, check the availability of those they wish to visit, and schedule a visit with that individual. As part of this process, the system tracks the availability of prison inmates as well as the devices and visit sites that are available to those inmates. In this manner, the system can quickly identify the availability of different inmates in order to provide on-demand scheduling capabilities to potential visitors. The system is connected to multiple facilities as well as public networks, and therefore can be remotely accessed. Additionally, the system also functions to monitor visits while they are in progress, as well as to store visit recordings for future review. Because the system is networked, remote monitors can access the review system in order to monitor visits or review recordings. The system also employs rigorous authentication and other security measures to ensure the safety and security of the visitors, the inmates, the staff, as well as others within the prison facility.
89 Citations
20 Claims
-
1. A visitation management system for allowing a visit participant to visit with an inmate of a controlled environment facility, the visitation management system comprising:
-
an authentication subsystem that includes; a database that stores identifying information of the visit participant; an identification number system configured to assign a globally-unique identification number to the visit participant; a biometric input device configured to capture biometric information of a purported visit participant; and an authenticator configured to compare the captured biometric information of the purported visit participant to biometric information of the visit participant stored in the database, and to authenticate or decline the purported visit participant based on the comparison; a visit scheduling subsystem that includes; a scheduling database that stores schedule information of visitation sites, as well as of the inmate, each item of schedule information including a link that provides additional information when activated; an interface unit that is configured to provide the schedule information to the visit participant, and receive a visit slot selection from the visit participant, wherein the visit scheduling subsystem updates the schedule information based on the visit slot selection; and a visit monitoring subsystem that includes; a server configured to receive audio and/or video data of the visit in real-time; a monitoring station configured to monitor the received audio and/or video data, to detect a violation of a predetermined rule, and to analyze the received audio and/or video data for one or more of a hook-flash event or a DTMF input for purposes of detecting an unauthorized three-way call attempt. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A visitation management system for allowing a visit participant to visit with an inmate of a controlled environment facility, the visitation management system comprising:
-
a registration subsystem configured to register a visit participant; an authentication subsystem configured to receive identifying information from a purported visit participant, and to authenticate the purported visit participant as the visit participant based on the received identifying information; a visit scheduling subsystem configured to access a scheduling database that includes a plurality of data records and stores schedule information of visitation sites, as well as of the inmate, to provide available visit slots to the visit participant, and to receive a visit slot selection from the visit participant, and a visit monitoring subsystem configured to analyze data of the visit for one or more of a hook-flash event or a DTMF input for purposes of detecting an unauthorized three-way call attempt, wherein each data record includes a link that provides additional information when activated. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for scheduling a visit between a visit participant and an inmate of a controlled environment facility, the method comprising:
-
authenticating a purported visit participant as the visit participant; retrieving availability information of the inmate; accessing a scheduling database that includes a plurality of data records and that stores schedule information of visitation sites, as well as of the inmate; generating a schedule of availability that includes a plurality of available visit slots based on the plurality of data records; providing the schedule of availability to the visit participant; receive an available visit slot selection from the visit participant; update a visit schedule based on the selection, the visit schedule including a plurality of schedule entries, each of the plurality of schedule entries including a link that provides additional information when activated; receive data of a visit; and analyze data of the visit for one or more of a hook-flash event or a DTMF input for purposes of detecting an unauthorized three-way call attempt. - View Dependent Claims (17, 18, 19, 20)
-
Specification