Apparatus for controlling access to and use of portable electronic devices

ABSTRACT

Various prison services are rendered more efficient by providing inmates access to portable electronic devices in a controlled and regulated manner. A dispenser is employed to control and monitor the checking out and return of portable electronic devices and to communicate with such devices during use by inmates to monitor inmate use and ensure the portable electronic devices are only used by inmates as authorized.

CROSS-REFERENCED TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.15/682,107, filed Aug. 21, 2017 which is a divisional of U.S. patentapplication Ser. No. 15/188,592, filed Jun. 21, 2016, now U.S. Pat. No.9,786,114, which is a continuation of U.S. patent application Ser. No.14/030,451, filed Sep. 18, 2013, now U.S. Pat. No. 9,508,212, all ofwhich are incorporated by reference in their entirety.

BACKGROUND I. Field

The present invention concerns the management of jails, prisons andother penal institutions. More particularly, this invention relates to asystem for providing prisoners with controlled access to portableelectronic devices such as laptop computers, tablet computers andwireless communication devices such as cellular telephones.

II. Related Art

A modern penal institution typically provides a collection of servicesto the inmate population. These services include, by way of example,library services, video entertainment services, computing services,grievance services, commissary services, and telephone and video chatcommunication services. The library services typically include access tolegal publications, and educational and training publications. The videoentertainment services include access to certain movies, televisionprograms and video games. Computing services include access to computerresources such as word processing and e-mail programs for communicatingwith lawyers or family members. The computing services also allow otherdocuments to be prepared and stored by prisoners. Modern penalinstitutions also typically afford a prisoner the opportunity toregister grievances if the prisoner believes he or she is beingmistreated. Since prisoners are not free to shop, most penalinstitutions operate a commissary where prisoners can purchase a varietyof personal convenience items such as a toothbrush, toothpaste, soapsand shampoos, snacks, magazines, playing cards or the like. Prisonersare also given opportunities to communicate with their family membersand lawyers using telephone or video conferencing technology. All ofthese services must be provided in a controlled fashion to maintainsecurity and prevent abuse.

Heretofore, integrated systems for providing all of the foregoingservices and others have been non-existent. Prisons have typicallyoperated and managed a separate system for each service leading toinefficient use of resources, ineffective delivery of service andincreased costs. The present invention uses portable electronic devicesto provide a fully integrated system for providing such services whichovercomes all of these disadvantages while at the same time offering thecontrol and security desperately needed in a prison environment. Infact, the present invention is so agile that it enables differingsecurity measures to be employed for different penal institutions,different groups of inmates in a particular penal institution and evenindividual prisoners.

SUMMARY

A plurality of portable electronic devices is provided. By way ofexample and without limitation, such portable electronic devices mayinclude laptop computers, tablet computers, personal digital assistants,iPod^(G) players made by Apple Computer, Inc. or similar media-playingdevices, cell phones, smartphones or other wireless communicationdevices. Each portable electronic device comprises a user interface, aprocessor, memory, a battery and a two-way wireless communicator. Againby way of example and without limitation, the two-way wirelesscommunicators may be any short-range, two-way communications device suchas the Wi-Fi and Bluetooth communicators typically found in today'sportable electronic devices. Each portable electronic device is alsoequipped with an identification tag such as a bar code or radiofrequency identification (RFID) tag. The identification tag can also bea coded identification signal periodically transmitted via the wirelesscommunicator of the portable electronic device.

Inmate access to the portable electronic devices is controlled using atleast one dispensing unit. The dispensing unit has a wirelesscommunications unit for two-way communications with the two-way wirelesscommunicators of the portable electronic devices. Thus, media, programs,files and other data can be transferred between the dispensing unit andthe portable electronic devices. The dispensing unit also has agraphical user interface and an alarm.

Additionally, the dispensing unit has a plurality of storagecompartments. Typically, a specific portable electronic device will beassigned to a specific storage compartment. To control access, eachcompartment has a door, an electronic lock and a door sensor for sensingthe position of the door. To ensure an assigned portable electronicdevice, and only the assigned portable electronic device, is positionedwithin a compartment, three separate sensors are employed. These includea light sensor which may be a camera or electric eye, a weight sensor,and an identification sensor which reads the identification tag of theportable electronic device. The alarm of the dispenser will be actuatedif any other object is placed in the compartment. The compartment isalso equipped with a data/power port for charging the battery of theportable electronic device when positioned within the compartment andfor transferring data between the portable electronic device and thedispensing unit. One or more status indicators may be employed toprovide an indication of the status of the door and lock, the presenceor absence of a portable electronic device within the compartment, thecharge state of the battery of the portable electronic device, andwhether the portable electronic device has completed a set-up process,such as an inmate specific set-up process, and is available for use bythat inmate.

Operation of the portable electronic devices and dispensing units arecontrolled using a server coupled to the dispensing units, at least oneadministrative workstation, and a relational database. The server isoperated under program control based upon inputs received from thedatabase and administrative workstation. Likewise, the server is used toprovide various status reports to the administrative workstation andupdate the database in response to signals received from the portableelectronic devices, the dispensers, and the administrative workstations.As explained more fully below, the database is a relational databasestoring data related to prisoner identity, prisoner accounts, prisonerrights, prisoner schedules, files and folders accessible by prisoners,and usage by prisoners. The database also includes data concerning theidentity, attributes and status of the dispensing units, portableelectronic devices, groups of prisoners and the individual prisoners.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing features, objects and advantages will become apparent tothose skilled in the art from the following detailed description andwith reference to the following drawings in which like numerals in theseveral views refer to corresponding parts.

FIG. 1 is a schematic diagram illustrating an apparatus for controllingaccess to and use of portable electronic devices.

FIG. 2 is a schematic diagram of a portable electronic device of FIG. 1.

FIG. 3 is a schematic diagram of the dispensing unit controller of FIG.1.

FIG. 4 is a schematic diagram illustrating the control and reportingstructures associated with a dispensing bin of a dispensing unit shownin FIG. 1.

FIG. 5 is a schematic diagram of the server shown in FIG. 1.

FIG. 6 is an exemplary floor plan of a penal institution.

FIG. 7 is a flow chart showing the set-up subroutine of the programwhich controls the services of FIG. 1.

FIG. 8 is a chart showing the data tables in the management portion ofthe database of FIG. 1.

FIG. 9 is a chart showing the data tables in the content portion of thedatabase of FIG. 1.

FIG. 10 is a chart showing the data tables of the user portion of thedatabase of FIG. 1.

FIG. 11 is a flow chart showing the security check subroutine of theprogram which controls the server and portable electronic devices ofFIG. 1.

DETAILED DESCRIPTION

This description of the preferred embodiment is intended to be read inconnection with the accompanying drawings, which are to be consideredpart of the entire written description. In the description, relativeterms such as lower, upper, horizontal, vertical, above, below, up,down, top, and bottom as well as derivatives thereof (e.g.,horizontally, downwardly, upwardly, etc.) should be construed to referto the orientation as then described or shown in the drawings underdiscussion. These relative terms are employed for convenience ofdescription and do not require that the apparatus be constructed oroperated in a particular orientation. Terms such as connected,connecting, attached, attaching, join and joining are usedinterchangeably and refer to one structure of surface being secureddirectly or indirectly to another structure or surface or integrallyfabricated in one piece, unless expressly described otherwise.

FIG. 1 shows, toward the left, a plurality of portable electronicdevices. Devices 10 and 12 represent tablet computers or personaldigital assistants. Devices 14 and 16 represent cell phones, smartphonesand other wireless telephones. Devices 18 and 20 represent laptopcomputers. Other portable electronic devices may be employed. Coupled toeach portable electronic device is an identification tag such as an RFIDtag 22 which uniquely identifies the portable electronic device. In lieuof an RFID tag 22, other electronically readable tags may be employed,such as a bar code. Alternatively, the portable electronic device may beprogrammed to periodically transmit an identification signal.

FIG. 2 shows a generic schematic diagram of a portable electronic devicehaving features typically common to portable electronic devices 10-20 orany other portable electronic device which might be used. Asillustrated, the portable electronic devices each include a processor orcentral processing unit (CPU) 30 coupled to a clock 32, random accessmemory (RAM) 34, read-only memory (ROM) 36 and input-output (I/O)circuitry 38. In turn, the I/O circuitry is coupled to a rechargeablebattery which supplies power to the portable electronic device anddocking circuitry 42 for charging the battery and transferring data,programs and files to and from the portable electronic device. Dataprograms and files may also be transferred to and from the personalelectronic device via a two-way wireless communicator 44 whichcommunicates using either Wi-Fi and/or Bluetooth protocols. Othercommunications protocols may also be employed by the wirelesscommunicator 44. Finally, the portable electronic device has a userinterface which may include a display 46, a keyboard 48 and a mouse orother pointing device 50. If the display 46 is a touch screen such asthat commonly used on tablet computers, personal digital assistants, andsmartphones, a separate keyboard and/or mouse may not be required.

Also shown in FIG. 1 are two dispensing units 52 and 54. Each dispensingunit 52 and 54 is shown as including twelve separate dispensing bins 56a-56 n. The dispensing units need not have the same number of dispensingbins. Likewise, the size and shape of the bins need not be the same.Some may be larger to accommodate laptop and tablet computers such aslaptops 18-20 and table computers 10-12 and others may be smaller tostore cell phones or smartphones 14-16.

As shown in FIG. 3, each dispensing unit of FIG. 1 has a controller 58comprising a CPU 60 coupled to a clock 62, RAM 64, ROM 66 and I/Ocircuitry 68. The I/O circuitry 68 is, in turn, coupled to a graphicaluser interface 70 comprising a separate display, pointing device andkeyboard, or alternatively, a touch screen display. The I/O circuitry isalso coupled to an alarm 72 and two separate communication devices whichtypically will include an Ethernet port 74 and a wireless communicationunit 76. The wireless communications unit 76 may employ either or bothWi-Fi and Bluetooth protocols (or some suitable alternate protocol) forwireless communication with the portable electronic devices 10-20. TheI/O circuitry of the dispensing unit is also coupled to a separate setof devices associated with each individual bin 56 a-n. These devices areshown schematically in FIG. 4.

As illustrated in FIG. 4, each bin includes an access door 80 and anelectronic door lock 82. The electronic door lock 82 is coupled to andcontrolled by controller 58 of FIG. 3. When the lock 82 is unlocked, thedoor 80 can be swung between opened and closed positions. A door sensor84 senses the position of the door and sends signals indicative of thedoor's position to the controller 58.

An important aspect of the invention is the ability to monitor andcontrol the contents of each bin 56 a-n. This capability is enabled byproviding three additional sensors for each bin 56 a-n which are alsocoupled to controller 58. These sensors include a light sensor 86 whichmay be an electric eye or even a digital camera, a weight sensor 88which sends signals indicative of the total weight of objects placed inthe bin to the controller 58 and an identification sensor 90 which readsthe identification tag of any portable electronic device placed in thebin.

Each bin also includes a battery charging/data port 92 which is coupledto the dock 42 of a portable electronic device 10-20 placed in the binto charge the battery 40 of the portable electronic device and transferdata files between the portable electronic device and the controller 58of the dispensing unit 52/54. Alternatively, an inductive batterycharging unit could be employed to charge the battery 40 and thewireless communication device 44 of the portable communication devicesand wireless communication device 76 of the dispensing unit could beemployed to transfer data and files.

Each dispensing bin may also be provided with one or more indicatorlights or a display 94. The indicator lights or display 94 may beemployed to signal which bin an inmate should access, whether the bin isempty or contains a portable electronic device, whether the door is openor closed, whether the lock is locked or unlocked, the charge state of aportable electronic device located within the bin, whether the portableelectronic device has completed an inmate-specific set-up process and isready for use by that inmate, whether the contents of that particularbin triggered an alarm, or any other information which may be useful toinmates, maintenance staff or security personnel.

Returning to FIG. 1, ultimate control of the operation of the dispensingunits 52 and 54 and the portable electronic devices 10-20 resides with aserver 100. The server 100 is coupled to a switch 101 which is alsocoupled to each of the dispensing units 52 and 54 via CATS or some othersuitable cable to provide an Ethernet connection. Likewise, the switch101 is shown as coupled to an administrative workstation 102 which maybe a dumb terminal providing a user interface for operation of theserver 100 or a personal computer. Additional administrative andmonitoring workstations may also be coupled to the server 100 via switch101. The server 100 is also coupled to a router 103 and from the router103 the Internet 104. An important feature of the invention is adatabase stored in a data storage device 126 coupled to server 100. Thetypes of tables and data included in the database will be discussedbelow with reference to FIGS. 8-10.

FIG. 5 shows the main components of the server 100. The server 100includes a CPU 112, a clock 114, RAM 116, ROM 118, a graphical userinterface 120 (e.g., a keyboard, mouse and display), I/O circuitry 122,an Ethernet port 124 and a data store 126 for storing the aforementioneddatabase.

FIG. 6 shows an exemplary floor plan of a prison or other penalinstitution 200. As illustrated, the penal institution 200 includes fourseparate cell blocks 202, 204, 206 and 208 which may alternatively bereferred to as houses, units or the like. Each of the cell blockscomprises a plurality of cells, bathrooms and other facilities and a dayroom 203, 205, 207 and 209. A control room 210 is centrally located andhas doors for directly accessing the day room of each cell block andobservation windows permitting guards located in the control room 210 toview and monitor the activities of each cell block. When the presentinvention is employed, one or more of the dispensing units 52/54 will beinstalled in each of the day rooms 203-209 and coupled to the server 100which may be conveniently located in the control room 210. Likewise, theswitch 101, router 103 and administrative workstations 102 may belocated within the control room 210 so that prison employees can controland monitor dispensing of items to prisoners housed in each of the cellblocks 202-209. Of course, larger penal institutions may comprisemultiple buildings or multiple floors of a single building arranged asexemplified in FIG. 6 or in some other suitable configuration. In suchcases, a single server 100, router 103 and switch 101 may be employedfor all such buildings or floors and separate workstations 102 installedin each control room 210 for use by prison employees to monitor andcontrol dispensing with respect to a specific group of dispensers 52/54.

The database stored in datastore 126 of the present invention includes aset of management tables such as those shown in FIG. 8. Many of thefields contained in these tables are completed using a set-up routine ofthe control software. A flow chart showing an exemplary set-up routineis illustrated in FIG. 7.

As shown in FIG. 7, the first step 400 in the set-up process is tocollect certain information related to the dispensers 52/54 which mayalso be referred to as kiosks. First, each kiosk is assigned an ID whichmay be an address assigned to the controller 58 of a specific dispenser.More specifically and by way of example, dispenser 52 will have a uniqueand different kiosk ID than dispenser 54. The kiosk ID of each dispenser52/54, together with a facility ID and housing unit ID which define thelocation of each kiosk, are stored together in the kiosk table 300 asshown in FIG. 7.

At step 402 in FIG. 8, portable electronic devices 10-20 are assigned tothe specific dispensers from which such devices will be dispensed. Anexample of the data collected during step 402 is shown as being storedin the devices table 302 of FIG. 8. Specifically, the unique electronicaddress of each such devices is recorded and stored together with theunique code which emanates from the RFID tag 22 attached to thatdevices. This data is associated with not only the kiosk ID of thedispenser 52/54 to which the specific electronic portable device will beused and is assigned, but also a locker ID identifying the specificlocker or bin 56 a-n of the dispenser 52/54 to which the portableelectronic device is assigned. For example, device 16 may be assigned tolocker or bin 56 d of dispenser 54 and this is all recorded in thedevices table 302 of the database 126.

Additionally, the devices table 302 may contain data further identifyingthe nature of the device in the device type field. Separate codes may beused to distinguish between tablet computers such as 10 and 12, cellphones such as 14 and 16 and laptop computers such as 18 and 20. Thedevices table 302 is also used to record information about the programsinstalled on a specific portable electronic devices 10-20 and othercontent loaded onto the device (e.g., articles, books, movies, music,television shows and the like). As will be explained in greater detailbelow, devices table 302 also is used to store status and historyinformation about the devices.

In most prison environments, prisoners are grouped for administrativeand security purposes. Further, different groups of prisoners aresometimes afforded privileges not afforded to other prisoners. Duringsetup step 404 of FIG. 7, different groups and rights and privileges ofsuch groups are identified and relevant information is stored in thegroups table 304 shown in FIG. 8. For example, a group might be allprisoners housed in cell block 202 and another group may be allprisoners housed in cell block 204. Each group is assigned a group IDwhich is stored in table 304. Each group is also assigned a group typecode also stored in table 304. For example, different codes may be usedto designate the level of security of the group, e.g., minimum securityor maximum security. Each group is also associated with one or morekiosks such that members of the group are only permitted to use, or arerestricted from using, a particular dispenser or kiosk 52 or 54 or setof dispensers. Similarly, group members may be permitted to use or berestricted from using certain programs or content.

For example, cell block 202 may be a minimum security facility and havekiosk 52 located therein. The prisoners are given access to kiosk 52. Awide array of programs and content are made available to that group ofprisoners via the portable electronic devices dispensed from dispenser52. On the other hand, cell block 204 may be a maximum security facilityhaving kiosk 54 located therein. The group of prisoners located in cellblock 204 might only be given access to commissary, library andgrievance programs and content. That group of prisoners may also berestricted from having access to a wider range of books, e-mail,telephonic and entertainment programs and content. All of thisgroup-related information is stored in groups table 304 of FIG. 8.

To provide further control over access, all programs and content madeavailable using the system is assigned a unique description, ID andstorage location. This data is stored in table 306 during step 406 ofthe set-up process.

A significant contributor to the security achieved by the presentinvention is the ability to monitor the status of each vending bin ofeach kiosk. The bin attribute information necessary to do so is storedin the “other” table 308 at step 408. Certain information is stored inthis table during the set-up process, but most of the data in this tableis collected and stored during use. During set-up, the kiosk ID oraddress and vending bin ID or address is stored for each bin. Also, oncea device 10-20 is assigned to the bin, an expected weight is stored.This is compared to the actual weight received from the bin's weightsensor 88 to help ensure no unauthorized items are placed in the bin oritems have not been removed from the portable electronic device.

As noted above, each program and item of content is assigned an ID andstorage location. Further information related to content is stored intables 310-316, examples of which are illustrated in FIG. 9. Thesetables are populated at step 410 of the set-up process. Table 310identifies music (or music subscriptions) which may be accessed in acontrolled fashion using the portable electronic devices. In a similarfashion, table 312 does so for video content such as movies andtelevision shows and table 311 does so for publications such as books,articles, legal decisions or the like. Prisoners are also permitted tocreate content of their own (e.g., letters, e-mails, grievances,commissary orders, etc.). This content is also stored in the datastore126 and indexed in table 316 of the database. As such, tables 310-316provide an index of all content available for one or more prisoners toaccess.

The set-up process also requires data to be entered for each user of thesystem including each prisoner. Examples of table where user datarelated to each prisoner are stored are shown in FIG. 10. At step 412 ofFIG. 7, each user is assigned a unique user ID and password. Eachprisoner is also asked to provide answers to several authenticationquestions. This information is stored in the user table 318.

Also stored in the user table 318 is an identification of each group towhich the specific user belongs. Each user may also be assigned aninmate classification. User access restrictions may also be entered atstep 412 and stored in table 318. Such restrictions may relate tospecific types of portable electronic devices 10-20 a user is permittedto use. For example, a user may be permitted to use a tablet computer,but restricted from using a cell phone. Such restrictions may alsorelate to programs and content the user may access or the number ofhours the prisoner may have access to portable electronic devices. Otheruser specific data such as the prisoner's sex, age, height, weight, haircolor, skin color, religion, criminal history or the like may also beentered here. Such user-specific data may also include a list of phonenumbers or e-mail addresses the specific inmate may call or sendmessages to which may be limited to, for example, the telephone numbersand e-mail addresses of the inmate's lawyer, spouse and/or otherdesignated relatives.

During the set-up process at step 414, an account is created for eachinmate so that the inmate may be charged for use of the portableelectronic devices, commissary or entertainment purchases and certainother services employed and content accessed using the portableelectronic devices without the need to use cash or a credit card. Theaccount data is stored in the account table 320. More specifically, theaccount table 320 is populated with each user's ID together with eachuser's available account balance. As the user makes use of the system,debits and credits are recorded in this table together with any latefees incurred by failing to return the portable electronic device ontime. In some cases, an inmate will own one or more of the portableelectronic devices used with the system. In such cases, the inmate'saccount is set up to indicate the inmate is the owner of the specificdevices and should not be charged for use of such devices. The “DeviceID” of each such device is recorded in the account table 320.

The system of the present invention not only permits rights andrestrictions concerning programs and content to be assigned at the grouplevel, but also at the individual user level. The specific user's rightsand restrictions, which may differ from the rights and restrictionsgenerally related to a group to which the user belongs, are recorded inthe rights table 322 during step 416.

The system of the present invention may also be used to establishindividual schedules for each user. Data related to scheduling isrecorded in table 324 during set-up step 418. The schedule may be assimple as defining the times during which the user may have access tothe portable electronic devices 10-20. The schedule may be furtherrefined to permit access to tablet computers 10-12 during certainperiods, cell phones 14-16 during other periods and laptops 18-20 duringstill other periods. Likewise, schedules may be refined to permit accessto certain programs (e.g., commissary, grievance and law library) duringlonger periods than access to other programs (e.g., telephone andentertainment). In a similar fashion, schedules can be created to givecertain inmates access to specific items of content during specificperiods of time. For example, if an inmate rents a movie for viewing,the schedule may only permit viewing during a specific, short window oftime.

Finally, table 326 (see FIG. 9) is partially populated at the same timeas table 318 of FIG. 10. Specifically, as each user ID is created, theuser is added to table 326. As explained more fully below, table 326plays an important role in the overall security of the system.

While FIG. 7 shows a specific sequence for carrying out the set-upprocess, the routine can be varied as desired. Likewise, the softwarecan be written to allow prison employees to branch to particularprocesses or steps as needed such as when new prisoners, groups orcontent offerings are added or data related to a particular dispenser,bin, inmate, group, program or content needs to be altered or added.

The system is ready for use once setup is complete, the dispensers 52and 54 are installed and connected via the switch 101 to the server 100,and the portable electronic devices 10-20 are positioned, as assigned,in the correct bin 56 a-n of the correct dispenser. FIG. 11 is a flowchart showing how the system may be used.

Operation begins at step 440 in FIG. 11 when an inmate approaches adispenser 52/54. Using the graphical user interface of the dispenser'scontroller 58, the inmate supplies identification information. This maybe a user name, password and responses to authentication questions.Alternatively, this may be a fingerprint or retinal scan. To employ thisalternative arrangement, the user interface of the dispenser must have asuitable scanner and a reference scan file should be stored in thedatabase and referenced to the inmate in table 318 of FIG. 10. At step442, the entered information is compared to data in table 318 of FIG. 10(or reference scan file) to see if there is a match. If any error occurssuch that the identification information entered by the inmate does notmatch the contents of table 318, then the program branches to step 466and error messages are sent not only to the graphical user interface ofthe controller 58 of the dispenser 52/54, but also to a workstation 102so a prison employee is alerted and can monitor and address thesituation. This also will occur if an inmate attempts to gain access toa dispenser 52/54 or bin 56 a-n which the inmate is not authorized toaccess. If there is a match, the program proceeds to step 444.

At steps 444 and 446, schedule information related to the inmate ischecked. Specifically, the server 100 checks table 324 to see if theinmate is then scheduled to use a portable electronic device. If suchuse at that time is not authorized, the program again branches to step466 and appropriate error messages are generated. If the inmate is, infact, scheduled to use a portable electronic device, a check of the datarelated to the inmate in table 320 of FIG. 10 is made at step 447 to seeif funds are required for the proposed use and if the inmate has therequired funds necessary for the proposed use. Of course, some servicesare offered without charge (e.g., use of a law library, filing of agrievance) while other uses are only permitted if the inmate hassufficient funds in his or her account. If there are insufficient funds,error messages are again generated. Otherwise, the program branches tostep 448.

At step 448, the program identifies a fully charged device available foruse using data in either table 302 or 308 and, at step 450, the programadjusts the device by installing, uninstalling, locking or unlockingprograms and content on the device to match the inmate's rights andrestrictions as listed in tables 304, 306, and 322. Once this step iscomplete, the door to the appropriate bin is unlocked and a visualindication of which bin should be accessed is provided at the dispenser.More specifically, at step 452 the lock 82 of a specific bin is unlockedso the door 80 of the bin may be opened to access the portableelectronic device stored therein. Simultaneously, the light or display94 associated with that specific bin is illuminated.

At step 454, usage of the device is enabled and monitoring of such usagebegins at step 456. While s portable electronic device is in use,programs, data and other signals are exchanged between the server 100and a portable electronic device via the dispenser associated with thedevice. Specifically, signals are transferred between the server anddispenser using the Ethernet connection between port 74 of the dispenserand 124 of the server. Signals are transferred between the dispenser andthe portable electronic device via the wireless communicators 76 and 44.The server 100 also acts as a traffic cop monitoring and controllingcommunications via the router 103 between the portable electronicdevices and the Internet 104. These same communication structuresprovide a vehicle for transmitting data between the server and theportable electronic devices during use. Content and programs can betransmitted back and forth during use. Likewise, communications betweenthe Internet 104 and a portable electronic device 10-20 can follow thispath. As explained above, the router 103 is controlled by the server 100to prohibit unauthorized communications with the outside and to monitorcommunications with the Internet 104 which may be authorized.

Real-time monitoring can occur using workstation 102. Further, a screenshot of the display of the portable electronic device is madeperiodically, e.g., every 30 seconds and saved as a file. These filesare indexed in table 326 such that an accurate archive of usage of thedevice is maintained.

Periodically, the system will send messages to the portable electronicdevice and to the workstation 102 alerting of the time by which thedevice must be returned. If the device is not returned on time, thedevice is rendered useless via a signal sent by the server 100 (orworkstation 102) to the portable electronic device via the wirelesscommunicating device 76 of the dispenser and wireless communicationsdevice 44 of the portable electronic device. When the inmate returns aportable electronic device to the dispenser, the user interface of thedevice or the dispenser will instruct the inmate. Specifically, suchinstructions include the identification of the specific dispenser 52/54and specific bin 56 a-n into which the portable electronic device is tobe placed. Using the light sensor or camera sensor 86, the systemdetermines at step 460 whether a device has been placed within thecorrect bin. Using the tag reader 90, the system determines whether thecorrect device has been placed in the correct bin. Using the weightsensor 88, the system determines whether any unauthorized items havebeen added to or removed from the portable electronic device. This isdone at step 462 by sensing the total weight of item(s) in the bin andcomparing the sensed weight to the expected weight recorded in table 308of FIG. 8. Doing so is important to ensure no contraband is transferredfrom one inmate to another using the bins 56 a-n and to ensure nothinghas been removed from the personal electronic device which would hinderits operation or which might even be used to create a weapon or othertool. If any error is detected during either steps 460 or 462, errormessages are sent to the graphical interface of the controller 58 of thedispenser 52/54 and to the workstation 102.

Additional steps of the return process will typically require the inmateto dock the portable electronic device (e.g., 10) to the docking port 92of the dispensing bin and then close the door 80 of the dispensing bin.Only when the server 100 is able to confirm that (1) the proper portableelectronic device (e.g., 10) has been placed in the bin (e.g., 56 f ofdispenser 52); (2) no parts are missing; (3) no additional items havebeen placed in the bin; (4) the portable electronic device is properlydocked so the battery can be recharged and data can be transferred; and(5) the door 80 of the bin is closed, will the device be deemed“returned”. At step 464, the lock 82 of door 80 is locked and theaccounting information in table 320 is updated to reflect any usage andother charges and late fees the inmate may have occurred.

After a portable electronic device is returned, the device will beprocessed for future use by other inmates. Typically, the battery willbe charged and the device will be reset to delete certain data, programsand files stored in the memory of the device during the earlier inmate'suse. The server can then poll the schedule information in the databaseto determine which inmate will be next to use the portable electronicdevice and prepare the device for use by locking, unlocking, installingand uninstalling programs, files and data in accordance with rights andrestrictions associated with the next inmate to use the device.

Those skilled in the art will recognize that certain steps outlinedabove may be deleted, rearranged or altered and additional steps may beemployed without deviating from the invention.

This invention has been described he in considerable detail in order tocomply with the patent statutes and to provide those skilled in the artwith the information needed to apply the novel principles and toconstruct and use embodiments of the example as required. However, it isto be understood that the invention can be carried out by specificallydifferent devices and that various modifications can be accomplishedwithout departing from the scope of the invention itself.

What is claimed is:
 1. A method for controlling access to a portableelectronic device, the method comprising: securing the portableelectronic device to a dispenser system; receiving a request from a userto access the portable electronic device; querying a portable electronicdevice management system to retrieve rights and restrictions of theuser; enabling a program on the portable electronic device, wherein theprogram corresponds to the rights of the user; locking a second programon the portable electronic device, wherein the second programcorresponds to the restrictions of the user; and in response to theenabling and locking, dispensing the portable electronic device from thedispenser system.
 2. The method of claim 1, wherein the rights of theuser define a time period during which the user is granted access to theportable electronic device.
 3. The method of claim 1, wherein the rightsof the user define a first time period during which the user is grantedaccess to the portable electronic device and wherein the rights of theuser define a second time period during which the user is granted accessto a different portable electronic device.
 4. The method of claim 1,wherein the request from the user is received on a graphical userinterface of the dispenser system.
 5. The method of claim 1, wherein thequerying further comprises: receiving biometric data from the user; andquerying the portable electronic device management system using thebiometric data.
 6. The method of claim 1, wherein the rights of the userdepend on an amount of available funds in an account corresponding tothe user.
 7. The method of claim 1, wherein the program is designated asfree of charge and wherein enabling the program further comprises:selecting the program from a plurality of programs including programsrequiring funding in an account corresponding to the user.
 8. Adispenser system, comprising: a container configured to secure aportable electronic device to the dispenser system; a memory; and atleast one processor coupled to the memory and configured to controlaccess to the container, wherein the at least one processor is furtherconfigured to: receive a request from a user to access the portableelectronic device; query the memory to retrieve rights and restrictionsof the user; enable a program on the portable electronic device, whereinthe program corresponds to the rights of the user; lock a second programon the portable electronic device, wherein the second programcorresponds to the restrictions of the user; and in response to enablingthe program and locking the second program, dispense the portableelectronic device from the container.
 9. The dispenser system of claim8, wherein the rights of the user define a time period during which theuser is granted access to the portable electronic device.
 10. Thedispenser system of claim 8, wherein the rights of the user define afirst time period during which the user is granted access to theportable electronic device and wherein the rights of the user define asecond time period during which the user is granted access to adifferent portable electronic device.
 11. The dispenser system of claim8, wherein the request from the user is received on a graphical userinterface of the dispenser system.
 12. The dispenser system of claim 8,wherein to query the memory, the at least one processor is furtherconfigured to: receive biometric data from the user; and query thememory using the biometric data.
 13. The dispenser system of claim 8,wherein the rights of the user depend on an amount of available funds inan account corresponding to the user.
 14. The dispenser system of claim8, wherein the program is designated as free of charge and wherein toenable the program, the at least one processor is further configured to:select the program from a plurality of programs including programsrequiring funding in an account corresponding to the user.
 15. Anon-transitory computer-readable device having instructions storedthereon that, when executed by at least one computing device, cause theat least one computing device to perform operations comprising: securingthe portable electronic device to a dispenser system; receiving arequest from a user to access the portable electronic device; querying aportable electronic device management system to retrieve rights andrestrictions of the user; enabling a program on the portable electronicdevice, wherein the program corresponds to the rights of the user;locking a second program on the portable electronic device, wherein thesecond program corresponds to the restrictions of the user; and inresponse to the enabling and locking, dispensing the portable electronicdevice from the dispenser system.
 16. The non-transitorycomputer-readable device of claim 15, wherein the rights of the userdefine a time period during which the user is granted access to theportable electronic device.
 17. The non-transitory computer-readabledevice of claim 15, wherein the rights of the user define a first timeperiod during which the user is granted access to the portableelectronic device and wherein the rights of the user define a secondtime period during which the user is granted access to a differentportable electronic device.
 18. The non-transitory computer-readabledevice of claim 15, wherein the request from the user is received on agraphical user interface of the dispenser system.
 19. The non-transitorycomputer-readable device of claim 15, wherein the querying furthercomprises: receiving biometric data from the user; and querying theportable electronic device management system using the biometric data.20. The non-transitory computer-readable device of claim 15, wherein theprogram is designated as free of charge and wherein enabling the programfurther comprises: selecting the program from a plurality of programsincluding programs requiring funding in an account corresponding to theuser.