Secure Nonscheduled Video Visitation System
7 Assignments
0 Petitions
Accused Products
Abstract
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
10 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A system comprising:
-
an identity database; a censorship database; a local video communication device configured to transmit a video visitation request to a remote video communication device, and/or to receive the video visitation request from the remote video communication device; and a video visitation central processing platform comprising one or more processors and/or circuits configured to; determine whether the video visitation request includes a designated time of day, week, and/or month for a video visitation session; connect a video visitation session between the local video communication device and the remote video communication device based on the determination; conduct a first analysis on video visitation data using the identity database to identify individuals participating in the video visitation session; conduct a second analysis on the video visitation data using the censorship database to detect a presence of an entry in the censorship database in the video visitation data; and control a state of the video visitation session based on the first analysis and the second analysis. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for video visitations in a controlled environment, the method comprising:
-
receiving, by a video visitation system, a video visitation request from a local video communication device or a remote video communication device; determining whether the video visitation request includes a designated time of day, week, and/or month for a video visitation session; connecting the video visitation session between the local video communication device and the remote video communication device based on the determination; analyzing the video visitation data to determine if content of the video visitation session is in accordance with a set of rules; determining that the video visitation session is not in accordance with the set of rules, wherein a plurality of signals are generated; and transmitting an alert that the video visitation session is not in accordance with the set of rules based on a weighted sum of the plurality of signals. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. A system comprising:
-
an identity database; a censorship database; and a video visitation central processing platform comprising one or more processors and/or circuits configured to; determine whether a request for a video visitation session between a local video communication device and a remote video communication device includes a designated time of day, week, and/or month for the video visitation session; connect a video visitation session between the local video communication device and the remote video communication device based on the determination; conduct a first analysis on video visitation data using the identity database to identify individuals participating in the video visitation session; conduct a second analysis on the video visitation data using the censorship database to detect a presence of an entry in the censorship database in the video visitation data; and control a state of the video visitation session based on the first analysis and the second analysis. - View Dependent Claims (36, 37, 38, 39, 40)
-
Specification