Virtual communication device interfaces
First Claim
1. A method implemented in a computer system disposed within a controlled-environment facility, the computer system having a processor and a memory device coupled to the processor, the memory device having program instructions stored thereon that, upon execution by the processor, configure the computer system to provide a virtual communication device interface, the method comprising:
- receiving identification from an inmate incarcerated within the controlled-environment facility;
authenticating the inmate based upon the identification;
retrieving information from one or more of a plurality of electronic information sources over a computer network,identifying preferences associated with the inmate based, at least in part, upon the identification, wherein the preferences indicate one or more types of information selected by the inmate;
retrieving data corresponding to the one or more selected types of information; and
scoring the retrieved data based on one or more security rules, wherein a first portion of the retrieved data is scored according to a first security rule, and wherein a second portion of the retrieved data is scored according to a second security rule;
determining whether the first portion of the retrieved data is prohibited based on the scoring of the first portion;
determining whether the second portion of the retrieved data is prohibited based on the scoring of the second portion; and
providing the first portion of the retrieved data to the inmate if the first portion is not prohibited; and
providing the second portion of the retrieved data to the inmate if the second portion is not prohibited.
20 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for virtual communication device interfaces are disclosed. In some embodiments, a method may include receiving identification from a resident (e.g., an inmate or prisoner) of a controlled-environment facility (e.g., a jail or prison) and authenticating the resident based upon the identification. The method may also include retrieving, from one or more of a plurality of electronic information sources over a computer network, information associated with the resident. The method may further include subjecting the information to a security protocol, the security protocol configured to identify a first portion of the information that is suitable for disclosure to the resident and a second portion of the information that is unsuitable for disclosure to the resident. The method may then include withholding the second portion of the information from the resident and providing the first portion of the information to the resident.
-
Citations
21 Claims
-
1. A method implemented in a computer system disposed within a controlled-environment facility, the computer system having a processor and a memory device coupled to the processor, the memory device having program instructions stored thereon that, upon execution by the processor, configure the computer system to provide a virtual communication device interface, the method comprising:
-
receiving identification from an inmate incarcerated within the controlled-environment facility; authenticating the inmate based upon the identification; retrieving information from one or more of a plurality of electronic information sources over a computer network, identifying preferences associated with the inmate based, at least in part, upon the identification, wherein the preferences indicate one or more types of information selected by the inmate; retrieving data corresponding to the one or more selected types of information; and scoring the retrieved data based on one or more security rules, wherein a first portion of the retrieved data is scored according to a first security rule, and wherein a second portion of the retrieved data is scored according to a second security rule; determining whether the first portion of the retrieved data is prohibited based on the scoring of the first portion; determining whether the second portion of the retrieved data is prohibited based on the scoring of the second portion; and providing the first portion of the retrieved data to the inmate if the first portion is not prohibited; and providing the second portion of the retrieved data to the inmate if the second portion is not prohibited. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system, comprising:
-
at least one processor; and a memory coupled to the at least one processor, the memory configured to store program instructions executable by the at least one processor to cause the system to; identify preferences associated with an inmate, wherein the preferences indicate one or more types of information selected by the inmate; receive media catalog information for a media catalog, wherein the media catalog information includes a plurality of media files available within a controlled-environment facility, and wherein the media catalog information is selected based on the identified preferences; scoring the received media catalog information based on one or more security protocols associated with the inmate, a first portion of the media catalog information is scored according to a first security protocol; and
wherein a second portion of the media catalog information is scored according to a second security protocol;determining whether the first portion of the media catalog information is allowed based on the scoring of the first portion; determining whether the second portion of the media catalog information is allowed based on the scoring of the second portion; and transmit the allowed portions of the media catalog information to the inmate via an electronic device disposed within the controlled-environment facility. - View Dependent Claims (20, 21)
-
Specification