Systems and methods for call treatment using a third party database
First Claim
1. A method comprising:
- performing, via one or more computer systems,receiving an indication of a telephone call initiated by a resident of a controlled environment facility to a non-resident of the controlled environment facility;
receiving, from a third party database, information related to the non-resident, wherein said third party database is not configured for identifying undesired call activity;
identifying, based at least in part upon the obtained information, a security risk that the resident represents to the non-resident, the security risk including a security risk score;
receiving a telephone billing name associated with the non-resident from a Line Information Database (LIDB);
comparing the telephone billing name with a name of the non-resident as stored in the third party database;
adjusting the security risk score based, at least in part, upon the comparison; and
determining whether to allow the telephone call based, at least in part, upon the security risk.
27 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods which detect unauthorized, impermissible, or otherwise undesired call activity through the use of one or more third party databases are shown. For example, a controlled environment facility information management system may access a database external thereto, such as a victim notification database, which is created and maintained by a third party unrelated to the controlled environment facility. Such third party database access may be accomplished at the point of call validation or caller verification for determining the treatment of the call (e.g., allowed, blocked, allowed with limitations, etcetera). Such call treatment determinations may be made with respect a particular prisoner or other resident of the controlled environment facility making the call, may be made with respect to all calls made from a particular controlled environment facility, may be made with respect to a group of controlled environment facilities, etcetera.
89 Citations
31 Claims
-
1. A method comprising:
-
performing, via one or more computer systems, receiving an indication of a telephone call initiated by a resident of a controlled environment facility to a non-resident of the controlled environment facility; receiving, from a third party database, information related to the non-resident, wherein said third party database is not configured for identifying undesired call activity; identifying, based at least in part upon the obtained information, a security risk that the resident represents to the non-resident, the security risk including a security risk score;
receiving a telephone billing name associated with the non-resident from a Line Information Database (LIDB);
comparing the telephone billing name with a name of the non-resident as stored in the third party database;
adjusting the security risk score based, at least in part, upon the comparison; anddetermining whether to allow the telephone call based, at least in part, upon the security risk. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method comprising:
-
performing, via one or more computer systems, receiving an indication of an initiation of a telephone call by an inmate within a controlled environment facility to an individual outside of the controlled environment facility; receiving information associated with the individual from a victim notification database, the information “
comprising a name of a victim”
;calculating a security risk score based, at least in part, upon the received information, the security risk score related to a security risk that the inmate represents to the individual; and making a call treatment decision with respect to said telephone call based, at least in part, upon the security risk score. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system comprising:
-
a memory; and a processor coupled to the memory and to a plurality of user terminals located within a controlled environment facility, the processor operable to; receive information from a database, the information corresponding to a party to a communication initiated via a given one of the plurality of user terminals operated by a resident of the controlled environment facility, the party being a non-resident of the controlled environment facility the party comprising a victim of a crime identified based, at least in part, upon said information from said database; calculate a graduated score based, at least in part, upon the received information, the graduated score indicating a security risk to the party; and control an aspect of the communication based, at least in part, upon the graduated score. - View Dependent Claims (29, 30, 31)
-
Specification