Systems and methods for blockchain wireless services in a controlled environment

ABSTRACT

A method of providing blockchain wireless services in a controlled environment is provided. The method comprises a wireless communication device associated with an inmate of a controlled environment receiving one of a voice and video call from a device external to the controlled environment. The method further comprises the device placing the received call into a hold state and sending a request for validation of the call via a blockchain, the request identifying at least parties to the call. The method further comprises the device, upon receipt of validation, removing the call from the hold state; and enabling at least one of voice and video functionality for the parties. The method further comprises the wireless communication device sending the request for validation to a telecommunications server and the server conducting real time monitoring of the call. The method further comprises the device continuously recording the call.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/874,391, filed May 14, 2020, which claims the benefit of U.S. of U.S.Pat. No. 10,694,032, filed Jul. 21, 2019, which claims the benefit ofU.S. provisional application 62/714,737 filed Aug. 5, 2018, each ofwhich is incorporated by reference herein in its entirety.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

Not Applicable

REFERENCE TO SEQUENCE LISTING, A TABLE, OR A COMPUTER PROGRAM LISTINGCOMPACT DISK APPENDIX

Not Applicable

FIELD OF THE INVENTION

The present disclosure is in the technical field of telecommunicationsservices. More particularly, the present disclosure is in the technicalfield of wireless telecommunications services provided in controlledenvironments.

SUMMARY OF THE INVENTION

The present invention is a controlled environment wireless system andprovides systems and methods of utilizing a blockchain network forproviding, managing and administering a controlled environment wirelesssystem.

BACKGROUND

Telecommunications services for inmates and other detainees in prisonsand other controlled environments is a controversial and importantsubject. Inmates have a right and deserve to regularly communicate withat least family members and providers of legal services. Wardens andother supervisors of controlled environments must provide such servicesbut are responsible for security of inmates and employees. Wirelessdevices in controlled environments present particular challenges as theyare small and can therefore be concealed and moved about easily.

In traditional telecommunications systems of controlled environments,the administrative costs involved in recording and maintaining dataassociated with inmate phone use are limited by the number of phonekiosks in the controlled environment. This number is typically small andtherefore makes it reasonable to maintain such administration via asingle conventional, centralized computing center, whether located onsite in the correctional facility or in a remote site. However, as thenumber of these telecommunication devices and the complexity of thesystem increases with the introduction of mobile devices to prisoners,inmates, arrestees, residents or other detainees in controlledenvironments, the amount of cost and complexity involved in maintainingthe records and monitoring permissions increases significantly.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a system of blockchain wireless services ina controlled environment according to an embodiment of the presentdisclosure.

DETAILED DESCRIPTION OF THE INVENTION

Systems and methods described herein provide for a wirelesscommunication device in possession of a detainee confined to acontrolled environment to securely place and receive wireless voice anddata transmissions to and from parties outside the environment via useof blockchain technology. A call, whether incoming or outgoing, includesinformation associated with a transaction to be stored in a blockchain.The blockchain is updated by disseminating the transaction informationthrough a multipath wireless mesh network to other wireless devices inpossession of fellow inmates. Prison management and others also receivethe transaction information.

The wireless device in possession of the detainee acts as a blockchainnode. The device further acts as a network node in a wireless meshnetwork or multipath wireless mesh network. The mesh networks operate onone or more of a Wi-Fi network, a radio frequency network, or via use ofother mobile ad hoc network-capable technology.

A blockchain is a database that is distributed among multiple computingdevices. A blockchain is formed from blocks, with each block havinginformation related to a transaction and linking the block to a priorblock in the chain. The devices can each have respective copies of theblockchain, so that no centralized or official copy of the blockchainexists and the devices are trusted equally. When a user engages in atransaction, some or all devices may verify the transaction. Afterverification, the devices can include information related to thetransaction into their respective copies of the blockchain.

Blockchain technology allows a network of computers to agree at regularintervals on the true state of a distributed ledger. The ledger isdistributed across many participants in the network. The ledger does notexist in any one place. Instead, copies exist and are simultaneouslyupdated with every fully participating node in the ecosystem.

Blockchain technology use in a multipath wireless network as describedherein may distribute requirements of a telecommunication system to manydistributed nodes. Blockchain may therefore reduce burden on processing,network and storage systems of a correctional facility. By enabling themobile devices within a controlled environment as blockchain nodes aswell as multipath wireless network nodes, not only can much of thecomputing power be offloaded from a facility's systems but the facilitymay safely and securely maintain the same control and oversight aspreviously available.

Recordkeeping and regulation of inmate device use may be distributed asprovided herein, with security and computing power increasing as asystem grows. By distributing a blockchain ledger among nodes in aclosed system of a controlled environment, not only is the computingpower distributed across nodes, but the records of the transactionswithin a system may also be distributed and replicated. This structuremay promote redundancies and failsafe options not previously available.

A distributed blockchain system creates a more permanent and unalterablerecord than a single database could, while allowing more nodes tofunction simultaneously. Distributed systems promoted by blockchaintechnology provide controlled environments the potential to distributeregulation of the system by giving the nodes the ability to regulatethemselves anonymously from each other and transparent to thoseadministering a controlled environment. Not only can more devices besupported, but they can be supported with fewer resources and increasedsecurity.

Blockchain may also reduce costs of running a secure network which isimportant in publicly funded institutions such as controlledenvironments. Because blockchain verifies trustworthiness, a centralizedserver does not need to handle this task. Friction of transactions isreduced, promoting cost and time savings.

Turning to the figures, FIG. 1 is a block diagram of a system ofblockchain wireless services in a controlled environment according to anembodiment of the present disclosure. FIG. 1 depicts components of asystem 100 provided herein including a telecommunications server 10, acontrol application 12, a blockchain node application 14, and a meshnetwork node application 16.

The system 100 also comprises a database 18, a network 20, an externalcommunication device 22, an external mesh network application 24, and ablockchain wallet or node application 26. The system 100 also comprisesa radio frequency network 28, a Wi-Fi network 30, and a controlledenvironment 32.

The system 100 also comprises wireless communication devices 34, 46, 48,50. Inmate mesh network node applications 36 a-d and blockchain networknode applications 38 a-d are also provided by the system 100 which arecomponents, respectively, of the wireless communication devices 34, 46,48, 50. The system 100 further comprises a monitoring and managementstation 40, a monitoring application 42, a management application 44, anadministrative mesh network node application 52, and an administrativeblockchain node application 54.

Discussion herein regarding the wireless communication device 34 appliesto the wireless communication devices 46, 48, 50 unless otherwise noted.Discussion herein regarding the inmate mesh network node application 36a and blockchain network node application 38 a applies to the inmatemesh network node applications 36 b-d and blockchain network nodeapplications 38 b-d, respectively, unless otherwise noted.

The controlled environment 32 may be a penal facility, correctionalfacility, rehabilitation center, jail, prison, holding cell, halfwayhouse, or hospital. The controlled environment 32 may be a penitentiary,camp, detention center, or other facility operated by a federal, state,provincial, municipal, military, or other public body or agency. Thecontrolled environment 32 may alternatively be privately operated undercontract with a court, correctional agency or other public body. In anembodiment, the controlled environment 32 may be a public hospital orother institution in which non-offending persons reside as wards of astate, province, municipality or other public body.

The wireless communication device 34 is associated with an inmate,detainee or other resident of a controlled environment 32 and originatesand receives wireless communications for the inmate. The communicationsinclude information associated with transactions to be included in theblockchain. The blockchain is updated by propagating transactioninformation through one or more of a multi-path wireless mesh networkand wireless mesh network to at least other inmate-associated wirelesscommunication devices 46, 48, 50. The wireless communication devices 34,46, 48, 50 may be mobile phones, cell phones, mobile computing devices,smartphones, desktop computers, laptop computers, tablet computers,custodial telephones, kiosks, or video communication stations.

A wireless system of the controlled environment 32 may be a wirelessmesh network or multipath wireless mesh network. The wireless system mayoperate on at least one Wi-Fi network 30, radio frequency network 28, orother mobile ad hoc network capable technology.

The wireless communication devices 34, 46, 48, 50 may act as wirelessmesh network nodes or multipath wireless network nodes using at leastthe inmate mesh network node applications 36 a-d, respectively. Thewireless communication devices 34, 46, 48, 50 may act as blockchainnodes using at least the blockchain network node applications 38 a-d,respectively.

The monitoring and management station 40 is a collection of processesexecuting on at least one computer enabling creation, removal, andenforcement of restrictions, verifications, configurations, andauthorizations of inmates, visitors, and other persons. Devices may bevalidated, added, or removed from the multipath wireless mesh network byadministrators of the station 40. Transactions may be inspected,analyzed, validated, monitored, and renewed by such administrators.

Administrators include wardens, guards, orderlies, prison staff,jailers, information technology professionals, system administrators,and law enforcement agents. Such administrators may manage various dataitems associated with inmates which may include altering restrictionsapplicable to inmates. Such restrictions include device userestrictions, inmate use restrictions, and inmate contact restrictions.

The monitoring application 42 and the management application 44 executeon the station 40. The monitoring application 42 is used by authorizedpersons to listen to outgoing or incoming detainee calls on a live orrecorded basis. These authorized persons may use electronic tools usedin various forensic activities. These activities include assisting inthe detection of prohibited behavior by detainees, outside parties, andothers including penal officers who may be violating or compromisingpenal facility regulations.

The management application 44 is used by authorized parties to configurethe control application 12 and manipulate files stored in the database18 and elsewhere. In addition to adding, removing and changing detaineecalling privileges, schedules and accounts, these actions compriseadding and deleting phone numbers and other contact information detailsof external devices 22 and associated persons authorized to speak withdetainees.

System administrators may use a browser as a “front end” or clientsoftware tool provided by the management application 44 to access thecontrol application 12, the database 18 and other components. Themanagement application 44 may provide simplified web forms to adddetainees and make other program changes. System administrators may bewardens, senior correction officials, or others that develop andimplement policies regarding program administration as a whole.

The station 40 and its components may be located inside, outside or bothinside and outside the controlled environment 32. The administrativeblockchain node application 52 executes at least partially on thestation 40 and provides administrators authority to validate, add,remove the wireless communication device 34 from the blockchain.

The administrative blockchain node 54 allows for truncating and pruningthe controlled environment blockchain ledger. The pruned portion isremoved from the wireless communication devices 34 and a new controlledenvironment blockchain ledger is created. The pruned data remains on atleast one of the administrative blockchain node 54 and the database 18.All configuration data of the wireless communication devices 34 are thenadded to the new controlled environment blockchain ledger. Pruning andtruncation of the blockchain ledger may take place at scheduledintervals, based on ledger size or other measures, or on an ad hocbasis. The monitoring and management station 40 also functions as anadministrative mesh network node application 52.

External communication devices 22, which may, for example, be used byfamily members or attorneys authorized to contact an inmate, may callthe inmate directly on the inmate's wireless device 34. External devices22 may be wireless telephones, computers, and tablet devices. Theexternal device 22 may interact with the telecommunications server 10and the control application 12 to establish such contact. While thetelecommunications server 10 and its components are illustrated in FIG.1 as external to the controlled environment 32, in embodiments thetelecommunications server 10 may be physically situated inside thecontrolled environment 32.

The telecommunication server 10 may further act as at least one of awireless mesh network node and a multipath wireless mesh node 14. Thetelecommunications server 10 may also function as a blockchain node 16

The telecommunications server 10 and the control application 12executing thereon manage communications between external devices 22 andcomponents inside the controlled environment 32. These managementactivities include inspecting, analyzing, validating, securing,monitoring, recording, and encrypting communications between theexternal devices 22 and the controlled environment 32. The wirelesscommunications devices 34, 46, 48, 50 may also perform these activities.

The wireless communications devices 34, 46, 48, 50 further validate,extract, convert, compress, encrypt, and insert data and meta-dataassociated with transmissions and transactions of external devices 22into the controlled environment blockchain ledger. External devices 22may be designated as trusted devices, illustrated in FIG. 1 as meshnetwork node application 24 for inclusion into the multipath wirelessmesh network.

Configuration data and meta-data for wireless communications devices 34,46, 48, 50 is added to the blockchain ledger in the form oftransactions. Such configuration data and meta-data may comprise inmateinformation including name and ID, inmate commissary and banking data,SIM identifiers for the devices 34, 46, 48, 50, MAC addresses, and phonenumbers. The data and meta-data may also include device identifiers suchas IMIE and IP addresses, GPS coordinates, approved contact information,approved applications, approved websites, and validation and biometricinformation that may include fingerprints, voice prints, and facialrecognition data.

Transactions are validated by at least one blockchain node 38 a-d, 14,26, 54 and added to the blockchain ledger. Transactions include data andmeta-data associated with voice calls, video conferences, text messages,voice mail messages, GPS coordinates, data, and alerts. Transactionsalso include data and meta-data associated with accesses andinteractions with web pages, multimedia files, forms and applications,shared data such as transaction records, transaction attributes,credentials, communication files, and other items of information.

An external device 22 may initiate a transaction, including a voice orvideo session, with a wireless communication device 34. Transactionsalso include the other types of electronic interactions describedimmediately above. The device 34, upon receipt of the incomingcommunication, places the session into a hold state, and sends a requestfor validation via the blockchain and to the telecommunications server10. The request may be validated via the blockchain and thetelecommunications server 10 may request and initiate monitoring as partof the validation if monitoring is desired, but validation by theblockchain may not be the sole source of validation. The requestcontains identification of parties to the call. The telecommunicationsserver 10 may request and initiate a conference call if real-timemonitoring is desired.

Upon receipt of validation, the device 34 removes the call from holdstate. The inmate may then begin his/her the voice or video session withthe caller using the external device 22. The device 34 may record thecall.

The recording of the session is continuously validated via theblockchain network to remain within the multipath wireless mesh network.The continuous validation may ensure than any failure of conference callor data upload is remedied by streaming the audio via the multipathwireless mesh network.

Recording of the call and video session between the external device 22and the wireless communication device 34 is distributed via at least oneof the multipath wireless mesh network, the Wi-Fi network 30, and thecellular network 28 to one or more of the database 18 and the blockchainledger. As part of the continuous confirmation during the session,meta-data for the recording is added to the blockchain ledger.

Validation may comprise adding a blockchain-based smart contract to theblockchain as discussed in detail below. Use of the smart contractfacilitates payment by the inmate for communications services.

Inmates using the device 34, 46, 48, 50 may conversely initiate atransaction, which may include a voice or video session or othertransaction as defined above, to an external device 22 that may be inpossession of a family member, for example. Similar to calls initiatedby the external device 22, the device 34 sends a request for validationvia the blockchain and to the telecommunications server 10 advising ofthe parties to the call. The telecommunications server 10 may initiate aconference call if real time monitoring is desired.

Upon validation, the call from the device 34 in possession of the inmateto the external device 22 is completed. The device 34 records the callas previously.

Recording of the call and video session to the external device 22initiated by the wireless communication device 34 is distributed via atleast one of the multipath wireless mesh network, the Wi-Fi network 30,and the cellular network 28 to one or more of the database 18 and theblockchain ledger. As part of the continuous confirmation during thesession, meta-data for the recording is added to the blockchain ledger.

The recording of the session initiated by the device 34 is continuouslyvalidated via the blockchain network to remain within the multipathwireless mesh network. As previously, the continuous validation mayensure than any failure of conference call or data upload is remedied bystreaming the audio via the multipath wireless mesh network.

A blockchain-based smart contract is filled in with necessaryinformation on the device 34 when the device 34 is involved in anoutgoing or incoming call or other transaction as defined herein. Tokenspurchased previously may be withdrawn from a blockchain wallet accountand/or banking account of the inmate and inserted into the contract.

The smart contract is validated and added to the blockchain network bythe network of nodes as part of the validation process. Upon attemptingof the voice or video call, the contract is executed depending on theoutcome of the call. Outcomes include at least one of call failure, noanswer, voicemail received, and call completion. Upon completion of thecall, coins or funds are released to at least one of a controlledenvironment wireless system service provider, the facility of thecontrolled environment 32, and caller depending on rules described inthe contract.

The external device 22 acting as a blockchain wallet or node 26 mayrequest a session with the device 34 of an inmate by generating ablockchain enforced communications request. The request is generated bycreating a transaction containing the desired scheduling details. Thedetails comprise at least one name of the requesting party, the name ofthe inmate to be contacted, the inmate ID, requested date and start timeof the call, and contact details of the requesting party.

The desired scheduling details are inserted into the blockchain alongwith payment tokens. The tokens may be pre-purchased or available inaccount balances of an external party. The tokens may also be availablein an inmate's commissary or other approved banking account of thecontrolled environment 32.

The processing of the blockchain enforced communications requestcontinues upon validation of the external device 22 as an authorizedinmate contact. Validation is completed by at least one of the severalcomponents including the device 34 of the inmate, the telecommunicationserver 10, and the control application 12. Validation takes place priorto passing of the request through to the controlled environment wirelesssystem.

Validation of voice and video calling as well as other transactions asdefined herein may include review of other restrictions on an inmate'suse of the device 34. The restrictions comprise limitations based on thetime of day, day of week, controlled environment restrictions, and otherrestrictions determined by authorities of the controlled environment.

Continuing with actions associated with a request by the external device22 for a communications session, upon validation the requestedscheduling transaction is added to the blockchain ledger. The request issent to wireless device 34, 46, 48, 50 that is the intended recipient.Confirmation is sent to the external device 22 of the requesting party.

When a communication between the external device 22 and the device 34 inpossession of an inmate is completed according to set parameters, thedeposited tokens are released to the controlled environment wirelesssystem service provider. Otherwise the tokens may be released back tothe walled that created the communications request.

Information associated with transactions is converted into an internetprotocol (IP)-based format to assist in generating formattedinformation. The blockchain network may be one of a public blockchain, aprivate blockchain, and a consortium blockchain. Nodes on the blockchainmay be one of an administrative node, a mandatory node, and an optionalnode.

The blockchain network may use at least one of a centralized ledger, apermissioned distributed ledger, and a permissionless ledger.Transactions may be at least one of compressed and encrypted.

System and methods described herein provide for the wirelesscommunication device 34, 46, 48, 50 to record a voice or video sessioninstead of the database 18. Further, the call is validated via theblockchain to allow error correction to insure the call continues. Uponcompletion, the recording is then stored in one or more of theblockchain and the central database 18 and the meta-data is added to theblockchain.

1. A method of implementing and managing an inmate-specific smartcontract, comprising: at least one computer on a blockchain networkcreating a smart contract containing information describing an inmate ina controlled environment; the at least one computer inserting the smartcontract into the blockchain network; the at least one computerreceiving a request to validate a blockchain transaction initiated bythe inmate; the at least one computer executing the smart contract tovalidate the transaction, the validation based on verification ofpermissions described in the smart contract.
 2. The method of claim 1,wherein the smart contract describes at least granted permissions andrights of the inmate and metadata associated with the inmate.
 3. Themethod of claim 1, further comprising the at least one computer updatingand modifying the smart contract based on at least changes to thegranted permissions and rights and metadata associated with the inmate.4. The method of claim 1, further comprising the at least one computerexecuting the smart contract to monitor, track, and record permissionusage by the inmate and inmate transactions via the blockchain network.5. The method of claim 1, wherein creation, verification, and auditingof the smart contract is limited to facility administration within thecontrolled environment.
 6. The method of claim 1, wherein the metadatacomprises at least one of inmate number and inmate biometricinformation.
 7. The method of claim 1, further comprising the smartcontract receiving access to databases and storage of the controlledenvironment.
 8. The method of claim 7, further comprising the smartcontract receiving the access to at least one of identify, update,remove, verify and extract data, metadata and permissions about theinmate.
 9. A system for inmate metadata analysis and response in acontrolled environment, comprising: a computer; and an applicationstored in the computer that when executed: creates an inmate-specificsmart contract in a blockchain network to at least one of monitor,manage and reward behavior of an inmate in a controlled environment,receives notification of unapproved behavior by the inmate detected byat least the blockchain network, and based on the received notification,one of removes and limits at least one permission and right of theinmate.
 10. The system of claim 9, wherein the system implements changesto the permissions and rights on at least one of a dynamic, ad-hoc andregular basis.
 11. The system of claim 9, wherein the notification isreceived at least one of at time of creation of the smart contract andsubsequent to such creation.
 12. The system of claim 9, wherein thesystem one of additionally and alternatively receives notification ofapproved, encouraged, and desired inmate behavior detected by at leastthe blockchain network.
 13. The system of claim 12, wherein based on thereceived notification, the system at least one of adds to and enhancesinmate permissions and rights.
 14. The system of claim 9, wherein thesmart contract describes permissions and rights granted to the inmateand describes metadata associated with the inmate.
 15. The system ofclaim 9, wherein the system further tracks transactions entered into bythe inmate, the transactions comprising at least one of commissarytransactions and accesses of electronic material.
 16. A method of inmatemanagement, comprising: a computer certifying at least one of forms,records, and data requiring action by an inmate of a controlledenvironment; the computer receiving a request from one of the inmate andthe controlled environment for at least one of the forms, records anddata; the computer determining electronic verification and approval ofthe request based on signatures submitted to a blockchain; and thecomputer, based on the determined verification and approval, fulfillingthe request.
 17. The method of claim 16, wherein the forms, the records,the data and metadata are shared and stored among nodes on theblockchain.
 18. The method of claim 16, wherein the forms, the records,the data and metadata are alternatively stored on the facility databasesassociated with the controlled environment.
 19. The method of claim 17,wherein the forms, the records, the data and metadata are at least oneof accessed and verified via the blockchain by the computer.
 20. Themethod of claim 16, wherein the required inmate action comprises atleast one of input, acknowledgment, and response.
 21. The method ofclaim 16, wherein the request is received from an approved personalcommunication device.
 22. The method of claim 16, further comprising thecomputer receiving the signatures from at least one of the approvedpersonal communication device and an administrative device.
 23. Themethod of claim 16, wherein the signatures are cryptographically signed.24. The method of claim 16, further comprising the computer at least oneof updating and recreating an inmate-specific smart contract as neededvia the blockchain in response to completion and verification of atleast one of newly created and updated forms, records and data.
 25. Asystem for providing commissary and virtual asset access privileges toinmates of a controlled environment, comprising: a processor; a memory;and an application stored in the memory that when executed on theprocessor: receives notification of a transaction executed via ablockchain, the transaction resulting in transfer of access tokens to aninmate of a controlled environment, delivers, based on the notification,the access tokens to a blockchain wallet on an inmate communicationdevice the access tokens representing persistent access rights, one oftransfers and presents, based on a received instruction, at least oneaccess token as payment for or proof of a right by the inmate to atleast one of consume, view, and listen to physical assets and virtualassets, wherein uses and permissions provided by access tokens arepredefined and are subject to change, update, expiration, andrevocation.
 26. The system of claim 25, wherein the inmate uses paymenttokens to purchase access tokens, wherein the access tokens are to oneof remain in the wallet to be presented as proof of a right to accessgoods, services and virtual assets, and spent as payment for one-timeaccess for goods, services and assets.
 27. The system of claim 25,wherein the virtual assets are at least one of an eBook, a commissaryitem, an audio file, a software application, a video file, and voice andvideo call usage minutes.
 28. The system of claim 25, wherein virtualassets one of accessed and consumed by an inmate communication deviceare stored at least one of in a central database and in the inmatecommunication devices.
 29. The system of claim 28, wherein the virtualassets are transmitted for download to the inmate communication devicevia at least one of a correctional facility mesh network and viastreaming to the inmate communication device.
 30. The system of claim25, wherein delivery of and access to access tokens requiresmulti-signature cryptographic transactions via the blockchain by theinmate and the administration on at least one of a regular or ad hocbasis.
 31. A method of controlling the use of an inmate communicationdevice, comprising: a computer creating a first smart contractdescribing first terms of usage of the device for a first user; thedevice inserting the smart contract into a blockchain upon receivingnotice of approval of the first smart contract; the device receivingentry of a first identifier associated with the first user seekingaccess to the device; the device, based on receiving entry of theidentifier and via a locally executing application, scanning theblockchain to locate and verify the first smart contract and a firstelectronic wallet associated with the first user; and the device one ofdownloading a first electronic wallet and activating the locally-storedfirst electronic wallet and beginning a first usage session per thefirst terms of usage.
 32. The method of claim 31, further comprising thefirst user is a first inmate in a controlled environment.
 33. The methodof claim 31, further comprising the device receiving the notice ofapproval from an administrative function of the controlled environment.34. The method of claim 31, further comprising the device, at one ofexpiry, logout, and termination of the first usage session, endingaccess of the first user to the device and removing access to the firstelectronic wallet by the first user.
 35. The method of claim 31, furthercomprising the device, at one of expiry, logout, and termination of theusage session, receiving physical movement to a second user comprising asecond inmate in the controlled environment.
 36. The method of claim 31,further comprising the device receiving entry of a second identifierassociated with the second user.
 37. The method of claim 31, furthercomprising the device scanning the blockchain to locate and verify asecond smart contract and to provide the second user access to a secondelectronic wallet.
 38. The method of claim 37, wherein the first andsecond electronic wallets contain tokens for use in commissary purchasesby the first user and the second user, respectively.