Off-site detention monitoring system
First Claim
1. A method for monitoring compliance with a restriction program using a voice verification system, comprising:
- initiating a telephone call from the voice verification system to a remote telecommunications device that is associated with a called party who is subject to the restriction program;
recording the telephone call to the called party in a memory of the voice verification system;
prompting the called party to provide a first password that is selected at random by the voice verification system from a plurality of passwords uniquely associated with the called party, the plurality of passwords stored in the memory of the voice verification system;
verifying a first response from the called party to determine if the first response is an acceptable match to the first password;
transmitting a unique message to the called party when the first response has been verified, wherein a user other than the called party has recorded the unique message specifically for the called party;
providing the user with real-time data indicating the results of the verifying step; and
providing the user with access to previous telephone calls to the called party, the previous telephone calls stored in the memory of the voice verification system.
32 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides an Internet based system and method for monitoring the location of a subject at any time via telephone voice verification. The system and method enables an agency officer to enroll a subject'"'"'s profile into a computerized system. The subject then responds to a series of verbally answered questions, the responses to which are utilized to establish a voice signature for the subject. Subsequently, the system and method automatically and periodically contacts the subject at pre-determined locations at pre-determined times to verify the subject'"'"'s actual presence at the locations via voice verification software. The present invention also enables the agency officer to monitor and review compliance efforts implemented by the Internet based system while also providing notifications of non-compliance by the subject to the agency officer under criteria previously established by the officer.
-
Citations
10 Claims
-
1. A method for monitoring compliance with a restriction program using a voice verification system, comprising:
-
initiating a telephone call from the voice verification system to a remote telecommunications device that is associated with a called party who is subject to the restriction program; recording the telephone call to the called party in a memory of the voice verification system; prompting the called party to provide a first password that is selected at random by the voice verification system from a plurality of passwords uniquely associated with the called party, the plurality of passwords stored in the memory of the voice verification system; verifying a first response from the called party to determine if the first response is an acceptable match to the first password; transmitting a unique message to the called party when the first response has been verified, wherein a user other than the called party has recorded the unique message specifically for the called party; providing the user with real-time data indicating the results of the verifying step; and providing the user with access to previous telephone calls to the called party, the previous telephone calls stored in the memory of the voice verification system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for monitoring compliance with a restriction program using a voice verification system, comprising:
-
initiating a telephone call from the voice verification system to a remote telecommunications device that is associated with a called party who is subject to the restriction program; recording the telephone call to the called party in a memory of the voice verification system; prompting the called party to provide a first password that is selected at random by the voice verification system from a plurality of passwords uniquely associated with the called party, the plurality of passwords stored in the memory of the voice verification system; verifying a first response from the called party to determine if the first response is an acceptable match to the first password; prompting the called party to provide a second password that is selected at random from the plurality of passwords when the first response is not an acceptable match to the first password; and verifying a second response from the called party to determine if the second response is an acceptable match to the second password; and establishing a telephone call to a user after a second or subsequent failed response from the called party, wherein the user is not in communication with the voice verification system during the verifying steps. - View Dependent Claims (8, 9, 10)
-
Specification