System and method for identity verification in a detention environment
First Claim
Patent Images
1. A method of identifying a first individual attempting to interact with a second individual prior to allowing an interaction, wherein the first individual is not associated with a detention environment and is not subject to monitoring, and wherein the second individual being associated with a detention environment, said method comprising:
- storing identity information of the first individual from a data source other than the first individual into a centralized database, the centralized database being accessible by disparate interactions between the first individual and the second individual;
prompting the first individual to submit identity-verifying information when the first individual is attempting to interact with the second individual, wherein the identity-verifying information is non-behavioral identity information;
receiving identity-verifying information from the first individual;
comparing the received identity-verifying information with the stored identity information in the centralized database by matching the received identity-verifying information to the stored identity information, and when there is no match between the received identity-verifying information and the stored identity information, requesting from the first individual different identity-verifying information until the identity of the first individual is verified by matching the different identity-verifying information to the stored identity information; and
allowing the interaction between the first individual and the second individual when there is a match between the received identity-verifying information and the stored identity information or when there is a match between the different identity-verifying information and the stored identity information.
6 Assignments
0 Petitions
Accused Products
Abstract
A system and method for identity verification in a detention environment and for tracking information between individuals in a detention environment with individuals who are not in the detention environment across disparate functional systems.
32 Citations
17 Claims
-
1. A method of identifying a first individual attempting to interact with a second individual prior to allowing an interaction, wherein the first individual is not associated with a detention environment and is not subject to monitoring, and wherein the second individual being associated with a detention environment, said method comprising:
-
storing identity information of the first individual from a data source other than the first individual into a centralized database, the centralized database being accessible by disparate interactions between the first individual and the second individual; prompting the first individual to submit identity-verifying information when the first individual is attempting to interact with the second individual, wherein the identity-verifying information is non-behavioral identity information; receiving identity-verifying information from the first individual; comparing the received identity-verifying information with the stored identity information in the centralized database by matching the received identity-verifying information to the stored identity information, and when there is no match between the received identity-verifying information and the stored identity information, requesting from the first individual different identity-verifying information until the identity of the first individual is verified by matching the different identity-verifying information to the stored identity information; and allowing the interaction between the first individual and the second individual when there is a match between the received identity-verifying information and the stored identity information or when there is a match between the different identity-verifying information and the stored identity information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for identifying a first individual attempting to interact with a second individual prior to allowing an interaction, wherein the first individual is not associated with a detention environment and is not subject to monitoring, and wherein the second individual being associated with a detention environment, said system comprising:
-
a centralized database to store identity information of the first individual from a data source other than the first individual, the centralized database being accessible by disparate systems related to management of interactions between the first individual and the second individual; an interaction management system that prompts the first individual to submit identity-verifying information when the first individual is attempting to interact with the second individual, wherein the identity-verifying information is non-behavioral identity information; an input receiver that receives identity-verifying information from the first individual; and a verification system that compares the received identity-verifying information with the stored identity information in the centralized database and verifies an identity of the first individual based on a match between the received identity-verifying information and the stored identity information, and when the verification system is unable to verify the identity of the first individual, requests from the first individual different identity-verifying information until the identity of the first individual is verified based on a match between the-different identity-verifying information and the stored identity information, wherein the interaction management system allows the interaction between the first individual and the second individual when there is a match between the received identity-verifying information and the stored identity information or when there is a match between the different identity-verifying information and the stored identity information. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for identifying a first individual attempting to interact with a second individual prior to allowing an interaction, wherein the first individual is not associated with a detention environment and is not subject to monitoring, and wherein the second individual being associated with a detention environment, said system comprising:
-
a centralized database to store identity information of the first individual from a data source other than the first individual, wherein the data source comprises a line information database, a best known name and address database, a social security database, a national financial information database, a national passport database, a government issued identification database, a warrants database, a national victim network database, and a “
do not contact”
database, the centralized database being accessible by disparate systems related to management of interactions between the first individual and the second individual;an interaction management system that prompts the first individual to submit identity-verifying information when the first individual is attempting to interact with the second individual, wherein the identity-verifying information is non-behavioral identity information; an input receiver that receives identity-verifying information from the first individual; and a verification system that compares the received identity-verifying information with the stored identity information in the centralized database and when the verification system is unable to verify the identity of the first individual, requests from the first individual different identity-verifying information until an identity of the first individual is verified; wherein the interaction management system allows the interaction between the first individual and the second individual when there is a match between the received identity-verifying information and the stored identity information or when there is a match between the different identity-verifying information and the stored identity information.
-
Specification