Telecommunication call management and monitoring system with voiceprint verification
First Claim
1. A control platform used in a correctional facility, the control platform comprising:
- a database configured to store identification data and first biometric data associated with user information related to a plurality of users, the identification data associating the plurality of users with a plurality of communication devices, and the first biometric data indicating one or more of the plurality of users are authorized to access a communication system; and
at least one processor configured to;
during a device access process;
receive a first radio frequency (RF) identification (RFID) encoded signal, from a RFID transmitter device, wherein the first RFID encoded signal includes identifying information of a purported user of a communication device of the plurality of communication devices;
perform a first comparison of the identification data with the first RFID encoded signal to determine that the purported user is authorized to access the communication device; and
provide access for the purported user to use the communication device based on a result of the first comparison; and
during a network access process;
receive second biometric data from the communication device based on the result of the first comparison;
perform a second comparison of the first biometric data with the second biometric data;
perform a third comparison of user information stored in the database associated with the first RFID encoded signal with user information stored in the database associated with the second biometric data;
provide access for the purported user to use the communication system based on a result of the second comparison and the third comparison;
modify the RFID transmitter device to transmit a second RFID encoded signal instead of the first RFID encoded signal; and
associate the second RFID encoded signal with the identification data stored in the database.
8 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a secure telephone call management system for authenticating users of a telephone system in an institutional facility. Authentication of the users is accomplished by using a personal identification number, preferably in conjunction with speaker independent voice recognition and speaker dependent voice identification. When a user first enters the system, the user speaks his or her name which is used as a sample voice print. During each subsequent use of the system, the user is required to speak his or her name. Voice identification software is used to verify that the provided speech matches the sample voice print. The secure system includes accounting software to limit access based on funds in a user'"'"'s account or other related limitations. Management software implements widespread or local changes to the system and can modify or set any number of user account parameters.
274 Citations
22 Claims
-
1. A control platform used in a correctional facility, the control platform comprising:
-
a database configured to store identification data and first biometric data associated with user information related to a plurality of users, the identification data associating the plurality of users with a plurality of communication devices, and the first biometric data indicating one or more of the plurality of users are authorized to access a communication system; and at least one processor configured to; during a device access process; receive a first radio frequency (RF) identification (RFID) encoded signal, from a RFID transmitter device, wherein the first RFID encoded signal includes identifying information of a purported user of a communication device of the plurality of communication devices; perform a first comparison of the identification data with the first RFID encoded signal to determine that the purported user is authorized to access the communication device; and provide access for the purported user to use the communication device based on a result of the first comparison; and during a network access process; receive second biometric data from the communication device based on the result of the first comparison; perform a second comparison of the first biometric data with the second biometric data; perform a third comparison of user information stored in the database associated with the first RFID encoded signal with user information stored in the database associated with the second biometric data; provide access for the purported user to use the communication system based on a result of the second comparison and the third comparison; modify the RFID transmitter device to transmit a second RFID encoded signal instead of the first RFID encoded signal; and associate the second RFID encoded signal with the identification data stored in the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 19, 21)
-
-
10. A communication management method comprising:
-
storing identification data and first biometric data associated with user information related to a plurality of users in a database, the identification data associating the plurality of users with a plurality of communication devices, and the first biometric data indicating one or more of the plurality of users are authorized to access a communication system; during a device access process; receiving a first radio frequency (RF) identification (RFID) encoded signal from a RFID transmitter device, wherein the first RFID encoded signal includes identifying information of a purported user of a communication device of the plurality of communication devices; performing a first comparison of the identification data with the first RFID encoded signal to determine that the purported user is authorized to access the communication device; and providing access for the purported user to use the communication device based on a result of the first comparison; and during a network access process; receiving second biometric data from the communication device based on the result of the first comparison; performing a second comparison of the first biometric data with the second biometric data; performing a third comparison of user information stored in the database associated with the first RFID encoded signal with user information stored in the database associated with the second biometric data; providing access for the purported user to use the communication system based on a result of the second comparison and the third comparison; modifying the RFID transmitter device to transmit a second RFID encoded signal instead of the first RFID encoded signal; and associating the second RFID encoded signal with the identification data stored in the database. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 20, 22)
-
Specification