Interception of unauthorized communications in an controlled-environment facility
First Claim
Patent Images
1. A method comprising:
- intercepting a communication of an unauthorized communication device operating within a controlled-environment facility;
routing the communication to a communications processing system associated with the controlled-environment facility;
presenting an admonishment to a user of the unauthorized communication device to warn the user that the communication has been intercepted, the admonishment comprising a statement that charges will apply for the communication;
facilitating the communication through the communications processing system;
andbilling for the communication as though the unauthorized communication device were a standard controlled-environment facility communication device.
14 Assignments
0 Petitions
Accused Products
Abstract
The present embodiments describe methods and systems for intercepting unauthorized communications in a controlled-environment facility. Unauthorized communications may originate from contraband cell phones, for example. In an embodiment, attempted communications from the contraband communication device are intercepted by the facility communication systems. The attempted communication may or may not be connected or completed, depending upon facility rules, policies, and regulations.
35 Citations
18 Claims
-
1. A method comprising:
-
intercepting a communication of an unauthorized communication device operating within a controlled-environment facility; routing the communication to a communications processing system associated with the controlled-environment facility; presenting an admonishment to a user of the unauthorized communication device to warn the user that the communication has been intercepted, the admonishment comprising a statement that charges will apply for the communication; facilitating the communication through the communications processing system; and billing for the communication as though the unauthorized communication device were a standard controlled-environment facility communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a communication processing system configured to process communications to and from communication devices within a controlled-environment facility; and communication security device coupled to the communication processing system, the communication security device configured to; intercept a communication of an unauthorized communication device operating within a controlled-environment facility; route the communication to the communications processing system associated with the controlled-environment facility; present an admonishment to the user of the unauthorized communication device to warn the user that the communication has been intercepted, the admonishment comprising a statement that charges will apply for the communication; facilitate the communication through the communications processing system; monitor the communication; and scan the communication for key words. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer implemented method comprising:
-
monitoring at least one communications access point associated with a controlled-environment facility for a communication from unauthorized communication device operating within the controlled-environment facility; routing the communication to a communications processing system associated with the controlled-environment facility; determining whether communication from the unauthorized device is allowed; blocking the unauthorized communication in response to a determination that communication from the unauthorized device is not allowed; determining whether the communication is to be covertly monitored; presenting at least one admonishment to a user of the unauthorized communication device stating that the communication has been intercepted and that charges will apply for the communication and obtaining billing information for the communication from the user, in response to a determination that the communication is not to be covertly monitored; and connecting the communication from the unauthorized communication device, in response to a determination that the communication is to be covertly monitored or following obtaining the billing information for the communication from the user. - View Dependent Claims (16, 17, 18)
-
Specification