METHOD AND SYSTEM FOR CONDUCTING AN ATTORNEY CLIENT PRIVILEGED CONFERENCE WITH THE LAWYER AT AN INDEPENDENT LOCATION
First Claim
Patent Images
1. A method for conducting a confidential privileged video conference at a selected time between an incarcerated inmate at a specific video conference terminal at the incarceration location and the inmate'"'"'s attorney located at a computer at an independent location comprising:
- a) establishing a server to securely link the conference terminal and the computer over a communication network;
b) verifying the lawyers status and identity;
c) verifying the inmate is the attorney'"'"'s client;
d) assigning an identity code for the attorney to sign into the server using the computer over the communication network;
e) establishing one or more people responsible to bring the inmate to the conference terminal at the selected time;
f) the attorney signing into the server while the inmate is brought to the terminal by the one or more people at the selected time;
g) the server establishing an encrypted link between the terminal and the computer at the selected time; and
h) the attorney and inmate conducting a confidential video conference.
0 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a secure system for video conference between an attorney and their incarcerated inmate client. Client is positioned at a video conference terminal and attorney at their computer and the conference scheduled, confirmed and completed over the internet in a secure manner.
20 Citations
16 Claims
-
1. A method for conducting a confidential privileged video conference at a selected time between an incarcerated inmate at a specific video conference terminal at the incarceration location and the inmate'"'"'s attorney located at a computer at an independent location comprising:
-
a) establishing a server to securely link the conference terminal and the computer over a communication network; b) verifying the lawyers status and identity; c) verifying the inmate is the attorney'"'"'s client; d) assigning an identity code for the attorney to sign into the server using the computer over the communication network; e) establishing one or more people responsible to bring the inmate to the conference terminal at the selected time; f) the attorney signing into the server while the inmate is brought to the terminal by the one or more people at the selected time; g) the server establishing an encrypted link between the terminal and the computer at the selected time; and h) the attorney and inmate conducting a confidential video conference. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for conducting a confidential privileged video conference between an inmate incarcerated at a specific incarceration location and a verified attorney at a computer positioned at an independent location comprising:
-
a) a video conference terminal at the specific incarceration location; b) a first server connected to a communications network designed to provide encrypted communication between the video conference terminal and the computer; c) a verification service on a second server for communicating with the attorney on the computer;
verifying the attorney and connecting the computer to the video conference terminal via the first server;d) a scheduling service on a third server comprising a database of available conference times, a network interface for selecting a date and time for the video conference and a timer for starting the teleconference; and e) a system for notifying at least one selected person at the incarceration location of the date and time of the conference for the purpose of bringing the inmate to the video conference terminal to participate in the conference. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for verifying an attorney for participating in a confidential privileged video conference between an incarcerated inmate at a video conference terminal at an incarceration location and the attorney at a computer located at an independent location comprising:
-
a) assembling an encrypted video conference system between the terminal and the computer; b) assigning an attendant to manage the attorney verification; c) the attorney providing proof of attorney status, proof of identity and proof that the inmate is the attorney'"'"'s client to the attendant; and d) the attendant issuing an access code to the attorney for accessing the encrypted video conference system. - View Dependent Claims (14, 15, 16)
-
Specification