Personalized devices for out-bound and in-bound inmate calling and communication
First Claim
1. A method, performed by a computing device, for establishing inbound calls to an inmate from an outside party, the method comprising:
- receiving input identifying authorized sources that are authorized to initiate and conduct calls with the inmate using an account that provides funds for the calls, wherein each of the authorized sources is associated with a respective authorized source telephone number or Voice Over Internet Protocol (VOIP) caller identifier;
storing a list of the authorized sources associated with the account in a database, the list of authorized sources comprising the respective authorized source telephone number or VOIP caller identifier of each of the authorized sources;
receiving an inbound call directed to the inmate;
determining a source of the inbound call to the inmate, wherein determining the source comprises performing caller identification to identify a source telephone number or VOIP caller identifier of a person, device, account, or location that initiated the inbound call to the inmate;
determining that the source of the inbound call is authorized by determining that the source telephone number or VOIP caller identifier is in the list of authorized sources;
permitting the inbound call to the inmate based on determining that the source of the inbound call is authorized;
receiving a second inbound call directed to the inmate;
determining a second source of the second inbound call to the inmate, wherein determining the second source comprises performing caller identification to identify a second source telephone number or second VOIP caller identifier of the second inbound call to the inmate;
determining that the second source of the second inbound call is not authorized by determining that the second source telephone number or second VOIP caller identifier is not in the list of authorized sources;
routing the second inbound call to an interface based on determining that the second source is not authorized;
receiving, via the interface, input identifying payment information for the second inbound call; and
permitting the second inbound call with the inmate based on the payment information.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and techniques are disclosed for establishing inbound calls and outbound calls involving inmates and outside parties. One exemplary technique receives input identifying authorized sources who are authorized to initiate and conduct calls with an inmate and stores a list of the authorized sources. The list, for example, can include telephone numbers, VOIP caller identifiers, and/or call privileges associated with the sources. The technique receives an inbound call directed to the inmate and determines whether the source of the inbound call is authorized or not, for example, by comparing information about the source with information in the list of authorized sources and/or based on the call privileges. If the source is authorized, the call is permitted. If not the technique routes the call to a payment interface for the caller to provide payment information.
55 Citations
10 Claims
-
1. A method, performed by a computing device, for establishing inbound calls to an inmate from an outside party, the method comprising:
-
receiving input identifying authorized sources that are authorized to initiate and conduct calls with the inmate using an account that provides funds for the calls, wherein each of the authorized sources is associated with a respective authorized source telephone number or Voice Over Internet Protocol (VOIP) caller identifier; storing a list of the authorized sources associated with the account in a database, the list of authorized sources comprising the respective authorized source telephone number or VOIP caller identifier of each of the authorized sources; receiving an inbound call directed to the inmate; determining a source of the inbound call to the inmate, wherein determining the source comprises performing caller identification to identify a source telephone number or VOIP caller identifier of a person, device, account, or location that initiated the inbound call to the inmate; determining that the source of the inbound call is authorized by determining that the source telephone number or VOIP caller identifier is in the list of authorized sources; permitting the inbound call to the inmate based on determining that the source of the inbound call is authorized; receiving a second inbound call directed to the inmate; determining a second source of the second inbound call to the inmate, wherein determining the second source comprises performing caller identification to identify a second source telephone number or second VOIP caller identifier of the second inbound call to the inmate; determining that the second source of the second inbound call is not authorized by determining that the second source telephone number or second VOIP caller identifier is not in the list of authorized sources; routing the second inbound call to an interface based on determining that the second source is not authorized; receiving, via the interface, input identifying payment information for the second inbound call; and permitting the second inbound call with the inmate based on the payment information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, performed by a computing device, for controlling inbound calls to an inmate from an outside party, the method comprising:
-
receiving input identifying authorized sources that are authorized to initiate and conduct calls with the inmate using an account that provides funds for the calls, wherein each of the authorized sources is associated with a respective authorized source telephone number; storing a list of the authorized sources associated with the account in a database, the list of authorized sources comprising the respective authorized source telephone number of each of the authorized sources; receiving an inbound call directed to the inmate; determining a source of the inbound call to the inmate, wherein determining the source comprises performing caller identification to identify a source telephone number or VOIP caller identifier of a person, device, account, or location that initiated the inbound call to the inmate; determining that the source of the inbound call is not authorized by determining that the source telephone number or VOIP caller identifier is not in the list of authorized sources; and based on determining that the source of the inbound call is not authorized, permitting the inbound call to the inmate; based at least in part on the inbound call lasting less than a predetermined time threshold, prompting the inmate to provide input identifying whether the inbound call was initiated by an unwanted caller who should be blocked; determining that the inbound call was initiated by an unwanted caller based on the input; storing the source telephone number of the unwanted caller for the account in the database; and blocking future calls from the unwanted caller to the inmate based on the source telephone number stored in the database. - View Dependent Claims (10)
-
Specification