Secure nonscheduled video visitation system
First Claim
1. A secure nonscheduled video visitation system for use in a controlled environment, the system comprising:
- an identity database;
a censorship database; and
a video visitation central processing platform containing one or more processors and/or circuits configured to;
connect a video visitation session between a local video communication device and a remote video communication device;
conduct a first analysis on video visitation data using the identity database to identify individuals party to the video visitation session, wherein a first signal is generated;
conduct a second analysis on the video visitation data using the censorship database to detect a presence of an entry in the censorship database in the video visitation data, wherein a second signal is generated; and
control a state of the video visitation session based on a sum of the first and second signals as weighted by a first and second weight;
wherein the video visitation session is not scheduled.
7 Assignments
0 Petitions
Accused Products
Abstract
Described are methods and systems in which the censorship and supervision tasks normally performed by secured facility personnel are augmented or automated entirely by a Secure Nonscheduled Video Visitation System. In embodiments, the Secure Nonscheduled Video Visitation System performs voice biometrics, speech recognition, non-verbal audio classification, fingerprint and other biometric authentication, image object classification, facial recognition, body joint location determination analysis, and/or optical character recognition on the video visitation data. The Secure Nonscheduled Video Visitation utilizes these various analysis techniques in concert to determine if all rules and regulations enforced by the jurisdiction operation the secured facility are being followed by the parties to the video visitation session.
54 Citations
20 Claims
-
1. A secure nonscheduled video visitation system for use in a controlled environment, the system comprising:
-
an identity database; a censorship database; and a video visitation central processing platform containing one or more processors and/or circuits configured to; connect a video visitation session between a local video communication device and a remote video communication device; conduct a first analysis on video visitation data using the identity database to identify individuals party to the video visitation session, wherein a first signal is generated; conduct a second analysis on the video visitation data using the censorship database to detect a presence of an entry in the censorship database in the video visitation data, wherein a second signal is generated; and control a state of the video visitation session based on a sum of the first and second signals as weighted by a first and second weight; wherein the video visitation session is not scheduled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for secure nonscheduled video visitation for use in a controlled environment, the method comprising:
-
connecting an unscheduled video visitation session between a local video communication device and a remote video communication device; analyzing the video visitation data to determine if content of the video visitation session is in accordance with a set of rules; determining that the video visitation session is not in accordance with the set of rules, wherein a plurality of signals are generated; and transmitting an alert that the video visitation session is not in accordance with the set of rules based on a weighted sum of the plurality of signals. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A method of aggregating an output of multiple video visitation analysis modules operating on video visitation data from an unscheduled video visitation session to produce a composite output, the method comprising:
-
receiving a first signal from a first analysis module, the first analysis module analyzing the video visitation data using an identity database to identify individuals party to the video visitation session; receiving a second signal from a second analysis module, the second analysis module analyzing the video visitation data using a censorship database to detect a presence of restricted behavior in the video visitation data; and setting the composite output based on a weighted sum of the first signal and the second signal. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification