Controlled environment media and communication system

ABSTRACT

The Controlled Environment Media And Communication System delivers communications services to residents of controlled facilities using a common network architecture. Some of the communications capabilities of the Controlled Environment Media And Communication System include media distribution, video visitation, intra-facility messaging, and other such communications services.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.16/866,076, filed May 4, 2020, which is a continuation of U.S. patentapplication Ser. No. 16/246,101, filed on Jan. 11, 2019, now U.S. Pat.No. 10,645,443 issued May 5, 2020, which is a continuation of U.S.patent application Ser. No. 15/603,095, filed on May 23, 2017, now U.S.Pat. No. 10,182,254 issued Jan. 15, 2019, which is a divisional of U.S.patent application Ser. No. 15/148,880, filed on May 6, 2016, nowabandoned, which are incorporated by reference herein in theirentireties.

BACKGROUND Field

The disclosure relates to methods and systems for delivery of multimediacontent and other communications services in secured facilities.

Background

American prisons house millions of individuals in controlledenvironments all over the country. The rights of these prisoners arelargely restricted for a number of reasons, such as for their safety andthe safety of others, the prevention of additional crimes, as well assimple punishment for crimes committed. However, these prisoners arestill entitled to a number of amenities that vary depending on thenature of their crimes. Such amenities may include phone calls,commissary purchases, access to libraries, digital media streaming, aswell as others.

BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES

Embodiments are described with reference to the accompanying drawings.In the drawings, like reference numbers indicate identical orfunctionally similar elements. Additionally, the left most digit(s) of areference number identifies the drawing in which the reference numberfirst appears.

FIG. 1 is an overview of a controlled environment media andcommunication system according to an embodiment;

FIG. 2 is an illustration of an access kiosk according to an embodiment;

FIG. 3 is an illustration of an access kiosk according to an embodiment;

FIG. 4 is an illustration of an access kiosk according to an embodiment.

DETAILED DESCRIPTION

The following Detailed Description refers to accompanying drawings toillustrate exemplary embodiments consistent with the disclosure.References in the Detailed Description to “one exemplary embodiment,”“an exemplary embodiment,” “an example exemplary embodiment,” etc.,indicate that the exemplary embodiment described may include aparticular feature, structure, or characteristic, but every exemplaryembodiment may not necessarily include the particular feature,structure, or characteristic. Moreover, such phrases are not necessarilyreferring to the same exemplary embodiment. Further, when a particularfeature, structure, or characteristic is described in connection with anexemplary embodiment, it is within the knowledge of those skilled in therelevant art(s) to affect such feature, structure, or characteristic inconnection with other exemplary embodiments whether or not explicitlydescribed.

The exemplary embodiments described herein are provided for illustrativepurposes, and are not limiting. Other exemplary embodiments arepossible, and modifications may be made to the exemplary embodimentswithin the spirit and scope of the disclosure. Therefore, the DetailedDescription is not meant to limit the invention. Rather, the scope ofthe invention is defined only in accordance with the following claimsand their equivalents.

Embodiments may be implemented in hardware (e.g., circuits), firmware,software, or any combination thereof. Embodiments may also beimplemented as instructions stored on a machine-readable medium, whichmay be read and executed by one or more processors. A machine-readablemedium may include any mechanism for storing or transmitting informationin a form readable by a machine (e.g., a computing device). For example,a machine-readable medium may include read only memory (ROM); randomaccess memory (RAM); magnetic disk storage media; optical storage media;flash memory devices; electrical, optical, acoustical or other forms ofpropagated signals (e.g., carrier waves, infrared signals, digitalsignals, etc.), and others. Further, firmware, software, routines,instructions may be described herein as performing certain actions.However, it should be appreciated that such descriptions are merely forconvenience and that such actions in fact results from computingdevices, processors, controllers, or other devices executing thefirmware, software, routines, instructions, etc. Further, any of theimplementation variations may be carried out by a general purposecomputer, as described below.

For purposes of this discussion, any reference to the term “module”shall be understood to include at least one of software, firmware, andhardware (such as one or more circuit, microchip, or device, or anycombination thereof), and any combination thereof. In addition, it willbe understood that each module may include one, or more than one,component within an actual device, and each component that forms a partof the described module may function either cooperatively orindependently of any other component forming a part of the module.Conversely, multiple modules described herein may represent a singlecomponent within an actual device. Further, components within a modulemay be in a single device or distributed among multiple devices in awired or wireless manner.

The following Detailed Description of the exemplary embodiments will sofully reveal the general nature of the invention that others can, byapplying knowledge of those skilled in relevant art(s), readily modifyand/or adapt for various applications such exemplary embodiments,without undue experimentation, without departing from the spirit andscope of the disclosure. Therefore, such adaptations and modificationsare intended to be within the meaning and plurality of equivalents ofthe exemplary embodiments based upon the teaching and guidance presentedherein. It is to be understood that the phraseology or terminologyherein is for the purpose of description and not of limitation, suchthat the terminology or phraseology of the present specification is tobe interpreted by those skilled in relevant art(s) in light of theteachings herein.

As discussed above, secured facilities endeavor to provide residentswith an ever-growing capability for communication and entertainment. TheControlled Environment Media And Communication System IP-based platformoffers significant advantages, including the ability to integratetelevision, local/network video/audio content, with other IP-basedservices like our offender messaging service, VOIP based voice telephonecalling, VoIP or WebRTC based video conferencing, or future IP enhancedservices as the jurisdictions needs dictate. The IP-based ControlledEnvironment Media And Communication System will be discussed in moredetail below.

Network Architecture Overview

The Controlled Environment Media And Communication System 100 enablesvarious communications services for residents of a controlledenvironment. In an embodiment, the controlled environment is acorrectional institution such as a prison facility and the residents areinmates or otherwise incarcerated in the correctional institution. Inother embodiments, the controlled environment may be any type offacility with a need to control and monitor content consumption such asa hospital, a dormitory, a mental health institution, a hotel, or othersuch facilities.

These types of controlled environments have unique requirements forcommunications and media distribution that are not present in other,non-controlled environments. First is the need to monitor and controlaccess to communications pathways. Second, the authorities providingmedia to a controlled environment have a strong interest in censoringthe types and subject matter of media content and communicationssessions involving residents of the secured facility. Third, acontrolled environment communication system operated by a controlledenvironment jurisdiction or authority must be cost efficient and havethe capabilities to recover costs from residents for access to services.Finally, secured facilities have an incentive to provide communicationsservices that are desirable to use and meet the needs of a largeresident population. There may be other additional unique concernsand/or requirements in controlled environments that are not discussedhere.

In a prison, the jurisdiction operating the prison has a strong interestin controlling the consumption and exposure to media and other content.For example, extremely violent media and content is not appropriate fora violent offender. In another example, some media content is associatedwith particular social movements or gang activity and may be deemed notappropriate for prisoner consumption. Even in the case of appropriatecontent, prison authorities may control access to media and content, forexample as a reward for good behavior. In these ways, conventional mediaand communication systems do not address the unique needs andrequirements of a system designed for controlled environments.

The Controlled Environment Media And Communication System 100illustrated in FIG. 1 addresses these unique requirements andconstraints imposed by the secured facility environment and furthersupports additional capabilities built on the network capabilities.Central to the Controlled Environment Media And Communication System 100is Core Network 130. Core Network 130 connects all systems and servicesin Controlled Environment Media And Communication System 100. CoreNetwork 130 is any suitable data networking system for transmittingdata. In an embodiment, Core Network 130 is an Ethernet based networkoperating over twisted-pair type wires or coaxial-type wires. CoreNetwork 130 comprises network switching capabilities, networkingcabling, and network interfaces for all connected terminals andservices. In an embodiment, Core Network 130 is a fiber-optic basednetwork including fiber-optic cables, fiber-optic switches, and otherfiber-optic type networking equipment. In another embodiment, CoreNetwork 130 is a wireless radio frequency based network such as Wi-Fi™.In some embodiments, Core Network 130 comprises network segments ofdisparate technologies, such that some elements of Core Network 130operate on different networking technology than other components. Forexample, Core Network 130 may include an Ethernet-based wired segmentand a Wi-Fi™-based wireless segment that inter-operate to provide dataconnectivity and services.

There are several different levels of network access in a securedfacility, just like there are several different levels of physicalaccess in a secured facility. For example, in a prison secured facility,prison inmates are physically secured within one section of thefacility. Another section of the facility may be physically accessibleto prison staff and visitors, and finally members of the public mayinteract with the prison on the outer-most level of physical security,such as a mailman delivering mail. The same analogy holds true fornetwork access within a secured facility.

The Core Network 130 contains subsections, or sub-parts that aresegmented from one-another for security purposes. Core Network 130 mayuse networking technologies such as Virtual LAN (“VLAN”), networkfirewalls, Network Address Translation (“NAT”), or other networkpartitioning or segmenting techniques to create these subsections. Onlynetwork traffic approved by the jurisdiction operating the Core Network130 is allowed to traverse network segments by using these techniques.In addition, network segments are physically separated from each othersuch that an unsecured network is not available in a secured physicallocation. For example, access to the outermost, least secured networklayer is not available to inmates in their cells. Rather, devices inphysically secured areas of the facility, such as a prison cell, areonly exposed to the appropriate network segment for that secured area.

The most secured network segment is Access Network 134. Access Network134 is the network segment that is available to the most securedlocations in the secured facility. For example, Access Network 134 isthe network available to inmates in prison cells in a prison securedfacility. Next is Edge Network 132. Edge Network 132 is an intermediatenetwork segment available to semi-secured areas of the secured facilitysuch as areas for visitors. Next, Core Network 130 is available to theleast-restrictive areas and facilities in the network. Finally, CoreNetwork 130 is connected to one or more external networks, some of whichmay be a public network. In an embodiment, one external network is theInternet. In other embodiments, Core Network 130 can also interface withpublic networks other than the Internet as well.

The Controlled Environment Media And Communication System 100 includesAuthentication Subsystem 129 which authenticates users on the network.In an embodiment, Authentication Subsystem 129 implements theLightweight Directory Access Protocol (LDAP), providing integrationcapability with most currently existing authentication systems.

In an embodiment, Core Network 130 includes Class of Service (“CoS”)administration features. The Core Network 130's Class of Service engineanalyzes parameters of data packets to determine the types of payloadscontained in the packets. Based on these identifiers, the Core Network130 can implement Quality of service (“QoS”) rules to shape traffic onthe Core Network. For example, Core Network 130 may prioritize real-timevideo communications over simple file transfers to maintain a highquality of video. These features become even more important to thefunctioning of Core Network 130 when multiple services utilize thenetwork such as media distribution, video visitation, and voiceservices.

User Interface Hardware and Software

Users interact with the Controlled Environment Media And CommunicationSystem 100 through a range of interfaces. In an embodiment, a kioskformat is used. One kiosk type is an inmate, or in-pod kiosk that isdesigned to be deployed in a controlled environment accessible toinmates or offenders. The Inmate Kiosk 200 includes computing resourcesand a range of input and output devices to facilitate communication withinmates. Inmate Kiosk 200 includes a CPU. The CPU includes a processor,storage, and memory for executing instructions to communicate with theControlled Environment Media And Communication System 100. In anembodiment, the CPU runs a standard operating system such as MicrosoftWindows™. In an another embodiment, the CPU runs a customized operatingsystem. In an embodiment, the CPU executes instructions stored onstorage local to the CPU, for example a hard drive or solid state drive.In an alternative embodiment, the CPU executes instructions stored on anetwork, for example by booting via PXE to load an operation systemstored remotely. In an embodiment, Inmate Kiosk 200 communicates withAccess Network 134.

For example, Inmate Kiosk 200 includes Input Devices 202 and 204. InputDevice 202 is a keyboard. Input Device 204 is a trackball type inputdevice. In alternative embodiments, other input devices may besubstituted for those pictured, including mouse type input devices,touchscreen type input devices, touchpad type input devices, or thelike. In an embodiment, Inmate Kiosk 200 also includes authorizationinput devices, such as Magnetic Card Reader 206. In alternativeembodiments, Inmate Kiosk 200 includes any other kind of authorizationinput device, such as but not limited to biometric devices, afingerprint reader, an iris scanner, a facial recognition camera, or anRFID reader. In an embodiment, Inmate Kiosk 200 includes Camera 208 forvideo communications, administrative supervision, or other uses. In anembodiment, Camera 208 is a three dimensional camera. In an embodiment,Inmate Kiosk 200 also includes Microphone Jack Input Connector 210.Monitor 212 is an LCD-type monitor, although any visual display can beused in alternative embodiments. Inmate Kiosk 200 also includes Speaker216. Inmate Kiosk 200 includes Handset 214, including a microphone andspeaker. In an embodiment, Inmate Kiosk 200 is compatible withfunctionality to enable communications to and from persons with hearingor speech difficulties. For example, Inmate Kiosk 200 may includesupport for standard TTY and TDD devices and protocols.

Inmate Kiosk 200 is housed in a hardened enclosure designed to withstandphysical abuse and resist ingress or damage to the computing componentsinside. For example, Inmate Kiosk 200 can be enclosed in a primarystainless steel enclosure 218 of a think gauge. In addition, Monitor 212is enclosed behind a protective covering, for example quarter-inch thicksecurity glass. Input Devices 202-208 are similarly designed to beresistant to physical abuse or vandalism. Any openings on Kiosk 200 areable to be locked closed so that only authorized access is permitted. Insome embodiments, Inmate Kiosk 200 includes a powered ventilation systemto provide adequate ventilation for computing and networking componentscontained therein. For example, Inmate Kiosk 200 includes avandalism-resistant fan opening to allow airflow to within the chassis.

In an embodiment, Inmate Kiosk 200 is designed to be accessible to allpersons, including disabled persons in compliance with any applicablestandard for accessibility to disabled persons. In an embodiment, InmateKiosk 200 is designed to be mounted on a wall. In an alternativeembodiment, Inmate Kiosk 200 is designed to be pedestal mounted.

In an embodiment, inmates interact with the system through a tabletform-factor computer housed in a secure housing. Tablet Computer 302includes a Touchscreen 304, Microphone 306, Speaker 310, and Audio Jack308. Tablet Computer 302 is housed in a secure housing 312. In otherembodiment, Tablet Computer 302 is not housed in a secure housing. Insome embodiments, Tablet Computer 302 also includes a Camera 314. In anembodiment, Tablet Computer 302 operates similar or substantially thesame software as Inmate Kiosk 200 such that all available services thatare available on the Inmate Kiosk 200 are also available on TabletComputer 302. Some examples below are illustrated in terms of InmateKiosk 200, but it is to be understood that Tablet Computer 302 couldtake the place of Inmate Kiosk 200 for any embodiment described herein.

Another kiosk type is a kiosk designed for use by visitors, or othernon-inmate individuals. In an embodiment, the Visitor Kiosk 138 isdeployed in common or visitation areas of a secured facility. In anembodiment, the Visitor Kiosk 138 is substantially similar to the InmateKiosk 200. In another embodiment, the Visitor Kiosk 138 is not requiredto be as vandalism-resistant as the Inmate Kiosk 200, and is not builtto the same vandalism-resistant specification as the Inmate Kiosk 200.One key differentiator between Inmate Kiosk 200 and Visitor Kiosk 138 isthat Visitor Kiosk 138 is connected to Edge Network 132, and InmateKiosk 200 is connected to Access Network 134. Similar to the InmateKiosk 200, Visitor Kiosk 138 may be embodied in different form factors,including a tablet computer.

In an embodiment, users interact with the Controlled Environment MediaAnd Communication System 100 through a software client. The softwareclient can be run on any client computing device, for example asmartphone, a laptop computer, a desktop computer, or a tablet computer,for example. In an embodiment, the software client is executed on asmartphone such as Smartphone 400. The software client is fullyconfigurable by the jurisdiction operating the Controlled EnvironmentMedia And Communication System 100. In an embodiment, the operations ofVisitor Kiosk 138 are fully encompassed by the software client operatingon a visitor's own hardware.

Media Distribution

Controlled Environment Media And Communication System 100 providesdistribution of media to users through the various access points,including for example Inmate Kiosk 200 through Media Subsystem 101. TheMedia Subsystem 101 provides support for both real-time and on-demandmedia, including video and audio. Examples of real-time media includebroadcast television, broadcast radio, cable television, satellitetelevision (i.e., Ku, Ka, or C-band), satellite radio, and live internetstreaming of video and/or audio. Examples of on-demand media includevideo-on-demand (VOD), audio-on-demand, movie downloads, musicdownloads, pay-per-view video (PPV), and other such asynchronous mediadistribution methods. The Controlled Environment Media And CommunicationSystem 100 makes available any combination of real-time and on-demandmedia as required by the jurisdiction operating the secured facility.

Asynchronous video content is sourced from Media Source #102. In anembodiment, Media Source 102 is a third party cloud media provider. Inanother embodiment, Media Source 102 is a media repository integral toMedia Subsystem 101. Media from Media Source 102 is encoded by MediaEncoder 104. In an embodiment, video content is encoded with MPEG-2,MPEG-4, H.264, or any other suitable video CODEC. Similarly, audiocontent is encoded with any suitable audio CODEC including but notlimited to MP3, AAC, or other audio CODEC.

Next, the encoded media is made available to consumers from MediaAcquisition Server 106. Media Acquisition Server 106 stores encodedmedia from Media Source 102 for future consumption. Media AcquisitionServer 106 maintains a catalog of media that is available to consumers.The media catalog is available to consumers to select media from MediaAcquisition Server 106.

In an embodiment, Media Source 102 stores video or movie content andMedia Acquisition Server 106 provides video-on-demand (VOD) services toconsumers. In an embodiment, Media Source 102 stores audio or musiccontent and Media Acquisition Server 106 provides music-on-demandservices to consumers. In other embodiments, both video and audio mediaformats are handled by the same system and both media types are madeavailable to consumers.

Broadcast media content is sourced from Broadcast Media Source 112. Inan embodiment, Broadcast Media Source 112 is a publicly broadcast mediasignal, such as broadcast television or radio. In an embodiment,Broadcast Media Source 112 is a privately broadcast medium such as aprivate internet stream, satellite television, or satellite radiobroadcast. In an embodiment, Broadcast Media Source 112 is a televisionor radio broadcast internal to the secured facility or a network ofsecured facilities. For example, a secured facility can operate aninformational television broadcast that is only available to residentsof the secured facility.

Media from Broadcast Media Source 112 is encoded by Broadcast MediaEncoder 110. In an embodiment, video content is encoded with MPEG-2,MPEG-4, H.264, or any other suitable video CODEC. Similarly, audiocontent is encoded with any suitable audio CODEC including but notlimited to MP3, AAC, or other audio CODEC.

Next, the encoded Broadcast media is made available to consumers, suchas the inmates, from Broadcast Media Acquisition Server 108. BroadcastMedia Acquisition Server 108 buffers encoded media from Broadcast MediaSource 112 for consumption. Broadcast Media Acquisition Server 108maintains a guide of broadcast media that is available to consumers. Forexample, a television guide indicating the channels available and themedia broadcast on those channels is made available by Broadcast MediaAcquisition Server 108. The media guide is available to consumers toselect broadcast media from Broadcast Media Acquisition Server 108.

Media from both Media Acquisition Server 106 and Broadcast MediaAcquisition Server 108 is delivered via the Core Network 130 to userhardware such as Inmate Kiosk 200 for consumption. In an embodiment, aMedia Distribution Cluster 116 is interposed between the acquisitionservers and the consumers. Media Distribution Cluster 116 operates as acache or buffer to distribute load and relieve the acquisition servers.In an embodiment, Media Distribution Cluster 116 comprises individualservers that are disposed within closer physical proximity to theconsumer such that overall network load is reduced.

In an embodiment, Core Network 130 supports multicast routing to reducenetwork load and increase bandwidth efficiency. Multicast routingenables Media Distribution Cluster 116 to send one stream of data tomany clients such as Inmate Kiosk 200 at once, reducing the load on thenetwork. In an embodiment, typical unicast networking is utilized whereappropriate.

Media Subsystem 101 streams content to remote end users utilizingUnicast and Multicast TCP, UDP, or WebRTC connections depending onsource content. Encoders 104 and 110 convert or transcode media from anysource format to any consumption format necessary for end users. Forexample, some of the media formats used are MPEG-4, H.264, or VC-1formats. In an embodiment, use of these formats enables distribution ofstandard-definition video (“SDTV”) content with requirements of about 1Mbps per stream and about 5 Mbps for high-definition video content(“HDTV”).

In an embodiment, Encoders 104 and 110 are software based, and inanother embodiment Encoders 104 and 110 are hardware-based. In anotherembodiment, a combination of both software and hardware are used toencode media in Encoders 144 and 110. In an embodiment, using advancedvideo compression and multicast routing, Media Subsystem 101 can achievea virtually unlimited number of channels to a virtually unlimited numberof users on the network. In an embodiment, over 1000 simultaneouschannels is achievable.

Media Subsystem 101 can be administered either on premise or remotely.In an embodiment, the Media Subsystem 101 includes a remoteadministration module that enables content provision and management ofMedia Subsystem 101 from a remote location. All content distributed byMedia Subsystem 101 is controlled by the system administrator utilizinga proprietary Class of Service administration.

In an embodiment, Media Subsystem 101 is designed to be fault tolerant.It is important that Media Subsystem 101 remain operational even in theevent of an emergency to broadcast emergency messages. Thus, the MediaSubsystem 101 can include redundant systems including redundant MediaAcquisition Server 106, Broadcast Media Acquisition Server 108, MediaDistribution Cluster 116, and all other components of Media Subsystem101. Media Subsystem 101 includes automatic failover means toautomatically remove inaccessible or otherwise unresponsive componentsout of the network and continue to provide services to the securedfacility.

Video Visitation

One aspect of the Controlled Environment Media And Communication System100 is video visitation provided by Video Visitation Subsystem 117.Video visitation is the process of a bi-directional or unidirectionalvideo communication between an inmate and a visitor such as family,friends, clergy, or the like. In an embodiment, Video VisitationSubsystem 117 enables video visitation through Inmate Kiosk 200illustrated in FIG. 2 . The Video Visitation Subsystem 117 makes use ofCamera 208 in the Inmate Kiosk 200 and similar cameras in other hardwareused to access the Controlled Environment Media And Communication System100. In an embodiment, video visitation is supported between users onsmartphones, tablet computers, inmate kiosks, and Visitor Kiosks 138.Other forms of video visitation include educational video visitationwhere an inmate can participate in a classroom via video feed.

The Video Visitation Subsystem 117 utilizes the Core Network 130 toroute video visitation traffic between inmate kiosks and visitor kiosks.Local real-time video visitation can be broadcast using similarmulticast techniques to reduce network traffic. For example, in anembodiment, an on premise classroom is broadcast throughout the securedfacility using multicast routing to a plurality of inmate kiosks andinmate devices, delivering educational experiences to large amounts ofinmates simultaneously while not significantly increasing network load.In an embodiment video transport uses IGMP version 2 for connecting to amulticast stream and the Real Time Streaming Protocol (RTSP) to delivervideo content. Video content may be compressed with any known videocompression codec, including but not limited to H.264, H.265, WebM,MPEG-4, MPEG-2, or the like. Likewise, video streams originating fromthe inmate hardware, including Inmate Kiosk 200 or Tablet Computer 302are compressed using similar video coding techniques. In an embodiment,video compression and decompression is assisted in the Inmate Kiosk 200by a graphical processing unit (GPU) co-processor.

A feature of the Video Visitation Subsystem 117 is the Video VisitationInvestigative Unit 115. The Investigative Unit 115 performs real-timemonitoring and storage of video visitations sessions for real-time andfuture review and analysis. Investigative Unit 115 allows investigatorsto view time-shifted video visitation feeds and pause, rewind, andfast-forward through video visitation sessions to efficiently andaccurately analyze the content of the video visitation session. Aninvestigative administrator is presented with the option to monitor anycurrent video visitation feeds or to play archived video visitationsessions stored in Video Visitation Database 118.

Video visitation session properly flagged as being confidential, such asa meeting between an attorney and a client, will not be made availableto investigative workstations and is not recorded into Video VisitationDatabase 118. In an embodiment, sessions marked as confidential can beidentified through one or more criteria such as a scheduling identifier,a specified remote contact, or a specified local access point such as aspecific kiosk within the facility.

Authorized users will have to ability to monitor visitation/encountersessions in process. Although the inmate and called party are notifiedduring the session setup that the session is recorded and subject tomonitoring, actual live monitoring of a session are completelytransparent to the parties.

Investigators using Video Visitation Investigative Unit 115 are able toperform monitoring of live sessions. In an embodiment, the Investigatoris able to select whether to see every visitation/encounter kiosk orjust the ones with active sessions. The user interface displaysinformation regarding the location of the kiosk stations and theidentity of the offender and the visiting party. To start livemonitoring, the session, the user clicks an icon in a graphical userinterface. This opens a new window displaying the both end's videosessions and the session audio, which is played over workstationspeakers or headphones if desired. If the administration users determinethat the session is inappropriate, they will be able to cut off thesession and/or make notes to the session (such as a case number) thatcan be searched for and reviewed later.

While live monitoring (or pulling historical recordings), each users isable to add notes (see the user interface view below) to the sessionrecording file. Investigators are able to select a specific portion ofthe recorded session to save as a separate file and add notes related totheir findings.

At a later time, investigator users using Investigative Unit 115 areable to retrieve video visitation session recordings. In an embodiment,investigators with appropriate account privileges are able to retrievesession recordings by utilizing a graphical user interface. In thegraphical user interface are multiple options for searching of sessionrecords including “quick searches” keyed on offender, visiting party,kiosk ID, or date/time bands. Ad-hoc queries on more complex criteriaare also be able to be defined. Once the search is conducted and sessionrecords are displayed, the records can be ordered on the basis of any ofthe session record fields by selecting the field name on a displayheader bar.

Session recordings are available for playback at the user's discretion.Clicking an icon on the record will open a new window displaying theboth end's video sessions and the session audio, which will be playedover workstation speakers or headphones if desired. The window providestools for control of the playback. While listening to or viewing arecording, the user may add notes to the session recording file. Theuser will also be able to select a pertinent portion of the recordedsession, save it as a separate file, add notes related to his/herfindings and archive the recorded conversation on a DVD.

In addition to recording capabilities, the Video Visitation Subsystem117 provides a full array of administrative capabilities, including theability to initiate and terminate individual or multiple sessions, aswell as an audio barge-in feature if desired for visitation warnings ofunacceptable behavior or language. This barge in-feature can be invokedfrom live session monitoring as described above. In conjunction withexisting jurisdiction scheduling databases, the Video VisitationSubsystem 117 is capable of auto-initiating and terminating sessions perthe scheduled time. Time limit warnings will be made available to allsystem users for them to be aware of impending session termination.

A Video Visitation Scheduling System 119 enables inmates and/or visitorsto schedule a video visitation session. The Scheduling System 119 alsooptionally alerts investigative administrators to the scheduled videovisitation so that the investigator can supervise the video visitationsession. The Video Visitation Subsystem 117 allows the jurisdiction tocontrol and or approve online scheduling. In addition, theauthentication requirements, offender classification/designation, STG,or other jurisdiction may be designated by the jurisdiction from a JailManagement data feed or entry of the data into the system database. TheVideo Visitation Subsystem 117 also provides for he online scheduling ofvideo visitation which would allow approved visitors to schedule visitsaccording to jurisdiction visiting regulations.

In an embodiment, Video Visitation Subsystem 117 is compatible withindustry standards such as H.320. H.320 is an umbrella recommendation bythe ITU-T for running Multimedia (Audio/Video/Data) over ISDN basednetworks. Video Visitation Subsystem 117 can utilize bandwidth savingMPEG-4, H.264, or VC-1 formats for internal communication between InmateKiosk 200 and Visitor Kiosk 138, for example. For video visitation witha remote video visitation user, Video Visitation Subsystem 117 can useH.320 standards, for example. An example of a H.320 video visitationsession is a minimum resolutions of 352×288 pixels at 30 frames persecond with minimum bandwidth requirements up to 1.544 Mbps per sessionas per H.320 standards. In an embodiment, Video Visitation Subsystem 117utilizes WebRTC standards to communicate with remote video visitationparticipants. Other such standards, formats, and processes as known inthe video communication arts can also be implemented as protocols inVideo Visitation Subsystem 117.

Intra-Facility Communication

In addition to media services and video visitation services, ControlledEnvironment Media And Communication System 100 enables communicationbetween controlled environment residents and the jurisdiction operatingthe controlled facility via Intra-Facility Communication Subsystem 121.One form of communication is a complaint or request, commonly referredto as a ‘kite’ in the correctional industry. A kite is a writtenrequest, complaint, or other communication from an inmate to facilitystaff and administrators. Examples of kites are requests to see adoctor, a question posed to a counselor, or other communications tofacility staff.

The Inmate Kiosk 200 supports input and sending of a kite message. In anembodiment, a kite message includes an inmate's name, an identifyingnumber associated with the inmate, the date the kite message is entered,the department the message is to be routed to, and the individual staffmember the message is directed to. In other embodiments, a kite messagecontains only a subset of these fields. The inmate is able to input thedata for a kite message via the Inmate Kiosk 200 using any combinationof input devices attached to or integral to Inmate Kiosk 200 such as akeyboard and mouse. In other embodiments where the inmates use a tabletcomputer to access the Controlled Environment Media And CommunicationSystem 100, the inmate inputs data for a kite message via a touchscreen.In an embodiment, some of the fields are presented as a drop-down menuin which the inmate entering in data can select a data value. Forexample, the department field may be a drown-down type input field withthe options “Health,” “Services,” “Canteen,” “Unit Manager,” etc.Selecting the appropriate entry routes the kite message to theassociated department within the secured facility. In an embodiment, theinmate is also allowed to flag a kite message with a priority indicator.Priority indicators include but are not limited to low priority, normalpriority, high priority, or emergency priority. By indicating theappropriate level of priority, facility staff are able to service allinmate and resident needs more efficiently. After entering in data forall necessary fields, the inmate submits the kite message from theInmate Kiosk by hitting a “send” button or the equivalent graphical userinterface element.

The graphical user interface for generating kite messages also includesa frequently asked questions section where simple or oft-encounteredkite requests can be addressed without the need to submit a kite requestmessage. The purpose of the frequently asked questions format is toprovide answers quickly and efficiently. The frequently asked questionscan also be directed to the kite message submission process as well,such as information regarding who will process the kite message and whento expect a response.

Once a kite message is generated and submitted from an inmate by, forexample, an Inmate Kiosk 200, the message is sent to the Intra-FacilityCommunication Subsystem 121. Received kite messages are stored in KiteMessage Database 120. In an embodiment, Kite Message Database 120 is arelational database, for example an SQL database. In another embodiment,Kite Message Database 120 is a non-relational document store.

Intra-Facility Communication Subsystem 121 then validates the kitemessage upon receipt. One validation step is to flag kite messagescontaining certain keywords and phrases. For example, keywords relatedto gangs, drugs, profanity, sexually explicit words, and other suchtopics are filtered and flagged for review by an appropriateadministrator. The keywords and phrases are stored in CensorshipDatabase 123. Censorship Database 123 can be updated at any time toinclude new words or phrases to search new incoming messages for. Inaddition, a search function allows administrators to search previouslysubmitted kite messages in Kite Message Database 120 for keywords andphrases in the Censorship Database 123. An alert message can also be setto inform system administrators when a kite message containing certainkeywords or phrases is submitted.

Another validation step is to disallow repetitive, duplicative, orotherwise abusive requests. In one embodiment, this filtering step is arate-limiting step wherein inmates are disallowed from sending more thana set number of kite messages in a given time period. The rate-limitercan apply to all messages sent by an inmate, or can be specific to eachrecipient. For example, the rate limiter can be set to disallow morethan 1 kite message to be sent to any given recipient each day. Thisprevents abuse of the Intra-Facility Communication Subsystem 121.Another validation step is to reject identical or substantially similarkite messages. Intra-Facility Communication Subsystem 121 searches theKite Message Database 120 for similar or substantially similar messagessubmitted by the same inmate to the same recipient and disallowsduplicates. This is also a mechanism by which inmates can be preventedfrom overwhelming the Intra-Facility Communication Subsystem 121. Anyother appropriate algorithm or limitation can be set on the submissionof kite messages by inmates to maintain a useful system that is not ableto be abused. In an embodiment, the rate limitations are dynamically seton an individual basis so that repeat kite message abusers are subjectto stricter limitations. In an embodiment, rather than simplydisallowing repetitive or duplicative messages, the Intra-FacilityCommunication Subsystem 121 can flag such messages and inmates fordisciplinary action by the facility staff.

Next, the kite message is routed to the appropriate department orindividual for processing. A feature of the Intra-Facility CommunicationSubsystem 121 is that each message is tracked through its lifecycle,from creation, opening, reading, responding, taking action, and closing.These events are stored along with the original kite message in KiteMessage Database 120. For example, when an administrator first opens anew kite message, that administrator's identification and a timestamp isrecorded along with the kite message to indicate that the message wasread. Next, when a kite message is acted upon, for example anappointment with a doctor was scheduled, that action is also recordedalong with identifiers and timestamps along with the kite message.

In an embodiment, facility staff who act on kite messages are requiredto electronically sign the kite message to document the interaction.System administrators can also register alerts to be generated at theoccurrence of any event associated with a kite message. For example, amedical department head can set an alert for any kite message acted uponby any staff members of the medical unit. Staff members are able toforward a kite message to another staff member for further action.

Intra-Facility Communication Subsystem 121 enforces privacy andconfidentiality of kite requests as set by the system administrator.Only those staff members and administrators authorized to view, edit,act on, or close kite messages are allowed to take such actions.

In an embodiment, any staff member that can act on a kite message canalso add notes or annotations to the kite message for reference. Theseannotations are viewable only by the staff members and are foradministrative purposes. For example, a note about an inmate's behavior,gang affiliation, or other information may be appropriate in certainsituations. These annotations are also stored in Kite Message Database120 along with the kite message. Notes and annotations may be in theform of text, images, or other records or data that is pertinent to thekite request.

Throughout the lifecycle of a kite message, inmate can view the statusand any updates on their kite request through Inmate Kiosk 200. In anembodiment, the inmate is presented with a graphical representation oftheir kite messages and requests, who is addressing their kite message,and what action has been taken. Through this interface, inmates are ableto cancel, amend, or append new information to a kite request to reflectchanging circumstances. In this way, the Intra-Facility CommunicationSubsystem 121 enables a task-oriented two-way communications channelbetween inmates and facility staff. Staff members are also able toescalate a kite message request in the event that a higher authority isrequired to act on the kite message request.

Kite request messages may have an expiration data set by the inmate, astaff member, or automatically based on request type as defined by thejurisdiction operations the Intra-Facility Communication Subsystem 121.When an expiration date is reached the kite message is automaticallyclosed by the Intra-Facility Communication Subsystem 121.

In an embodiment, Intra-Facility Communication Subsystem 121 can chargeinmates for specific events associated with a kite message. For example,an institution can charge an inmate account for a medical visit or for asuperfluous or duplicative request that burdens the administrative staffof the facility. If a staff member determines a charge should be leviedupon the submitting inmate, that charge can be indicated in the KiteMessage Database 120. In an embodiment, inmates are charged forrepetitive or duplicative kite messages as detected in the validationdescribed above. A separate billing and accounting process then makessure the charge is properly paid and settled for the services or otherfunctions performed.

Intra-Facility Communication Subsystem 121 also provides a robustinvestigation and analysis platform on which to examine kite messagesstored in Kite Message Database 120. These analytics can providevaluable insight into the inner workings of a secured facility forfacility administrators. For example, if a number of complaints arereceived about the same topic, facility administrators can address thattopic. In this way, the kite system can act as a kind of suggestion boxfor facility administrators. In an embodiment, administrators are ableto search past kite messages by key word, department, inmate, recipient,or any other data field or combination of data fields stored in KiteMessage Database 120. Searches can be run one time, or stored toperiodically generate reports for particular search queries. One exampleof a stored query is a query that outputs a list of similar kitemessages received within a period of time from different inmates orresidents. For example, if a number of inmates all submit kite messagesidentifying that there is a rodent infestation in the facility,administration will be notified immediately so that the problem can berectified in a timely fashion.

In an embodiment, Intra-Facility Communication Subsystem 121 interfaceswith a legacy system already in place at the secured facility. Severallevels of interfacing with legacy systems are possible. First, theIntra-Facility Communication Subsystem 121 can import archived data intoIntra-Facility Communication Subsystem 121 for analysis and archiving.Second, Intra-Facility Communication Subsystem 121 can co-exist with anexisting data entry system that is already in place, such thatIntra-Facility Communication Subsystem 121 imports data from anothersource for processing and analysis. Third, Intra-Facility CommunicationSubsystem 121 can integrate with a legacy analysis and processingbackend while using the Inmate Kiosk and other kite message inputmethods described herein. In any level of integration, theadministration operating the secured facility is able to choose anoptimal integration strategy to work with legacy systems.

Intra-Facility Communication Subsystem 121 includes a data export andimport feature for integration with legacy systems and other system. Inan embodiment, Intra-Facility Communication Subsystem 121 is able toexport and import kite message data in standard data formats. Forexample, in an embodiment, Intra-Facility Communication Subsystem 121can export and import kite messages in a comma separated value list forinterfacing with any external system that can accept a comma separatedlist. Other formats may be used in other embodiments, such as but notlimited to XML, JSON, HTML, database formats, spreadsheet formats, andthe like.

Other Inmate Communications Services

In some embodiments, Controlled Environment Media And CommunicationSystem 100 facilitates other communications services to and from inmatesand other secured-facility residents. One example of othercommunications services is Voice Service 122. Voice Service 122 enablesbi-directional voice calling to and from the Inmate Kiosk 200 using VOIPprotocols utilizing the same Core Network 130 as the othercommunications described herein.

Another example of other services are Data Services 124. Data Services124 enable arbitrary data to be sent to and broadcast from the InmateKiosk 200. Examples of data that Data Services supports are newsstories, news video clips, weather forecasts, live TV guides,video-on-demand directories, and other such data that is of interest toinmates within a secured facility.

The Controlled Environment Media And Communication System 100 alsoincludes Emergency Alert System 126. Emergency Alert System 126 providesjurisdiction system administrators with a barge-in capability of bothvideo and/or audio which will override any and all current contentconsumption. For example, an inmate watching VOD or broadcast televisioncontent will be interrupted by Emergency Alert System 126 in the eventof an emergency. Emergency Alert System 126 will then display theemergency alert message on the screen and also audibly announce theemergency. In an embodiment, Emergency Alert System 126 utilizeswake-on-Lan (“WoL”) capabilities of client devices to activatenon-active systems to broadcast the emergency message. The WoLcapabilities can only be triggered by authorized administrativepersonnel.

Administrative Services

Administrative Workstation 114 has connectivity to Core Network 130.Administrative staff of the secured facility can operate AdministrativeWorkstation 114 to manage all services offered on Core Network 130within the facility. One function of Administrative Workstation 114 isto manage media content distribution. For example, different bundles ofmedia content can be provided to users based on the needs of the securedfacility and user preferences.

Administrative Workstation 114 also provides comprehensive real-timereporting capabilities which enable facility providers to manage theirprison more effectively. One such report is a report of revenues,expenses, transactions, and other financial information and recordsassociated with the provision of communications services describedherein.

In an embodiment, the Administrative Workstation 114 offers real-timereporting of all media being consumed by inmates and other residents.This functionality is useful for facility providers who want to conductinmate-metric analyses or evaluate the viewer demand for a particularchannel, program, or content.

In an embodiment, the Administrative Workstation 114 offers interactiveinmate surveys which enables content facility providers to collectinformation from inmates while they watch their favorite TV channels,program, or content. Survey questions can be defined in eitherclosed-ended (multiple choice) or open-ended (no preset answer) formats.The survey functionality is attractive for service facility providerswho want to conduct marketing research or measure results fromadvertising campaigns in real-time.

In an embodiment, Administrative Workstation 114 provides systemadministrators with several cut-off/control mechanisms to controlcommunications on the system. The cut-off allows the administrator toterminate individual kiosk services or all kiosk functions forindividual, groups, or all kiosks simultaneously. In addition,administrators can take control of individual functions of the kiosk tosupport users or initiate investigative monitoring utilizing thehardware and software functions for example use the microphone andcamera to monitor activity near the kiosk or use the speaker or displayto instruct the inmate.

In an embodiment, more fine-grained controls are also available tosystem administrators via Administrative Workstation 114. For example,administrators can regulate access to the Media Subsystem 101 through aclass of service (“COS”) database. Users on interface endpoint such asInmate Kiosk 200 can be grouped together by living unit, offender type,or individually. Each communication service offered by the ControlledEnvironment Media And Communication System 100 is controlledindividually. For example, Media Subsystem 101 controls includefine-grained controls of which channels or media sources are availableto a particular inmate, and the time of day those sources are available.Again, these controls can be applied individually or by any grouping ofinmates.

In an embodiment, the Administrative Workstation 114 includes orduplicates all capabilities of Video Visitation Investigative Unit 115.Again, these capabilities are applicable to users on interface endpointsuch as Inmate Kiosk 200 and can be grouped together by living unit,offender type, or individually.

Billing

Billing Subsystem 128 handles billing for media distribution, videovisitation, and all other communication services offered by ControlledEnvironment Media And Communication System 100. In an embodiment,Billing Subsystem 128 is centralized and shared among all othersubsystems and components of Controlled Environment Media AndCommunication System 100. In another embodiment, Billing Subsystem 128comprises multiple components tailored to each other subsystem andunique to that subsystem. In all embodiments, Billing Subsystem 128offers methods of billing residents, inmates, outside parties, and allother users of Controlled Environment Media And Communication System 100for the communication services rendered. For example, with respect toMedia Subsystem 101, the Billing Subsystem 128 handles charging inmatesand residents for delivery of media content. With respect to VideoVisitation Subsystem 117, Billing Subsystem 128 charges residents,inmates, and/or outside parties appropriately for video visitationservices.

In an embodiment, Billing Subsystem 128 performs real-time billing whichreduces the risk of uncollectible accounts. To also reduce the chance ofuncollectible accounts, Billing Subsystem 128 utilizes AuthenticationSubsystem 129 to authenticate users by any method available toAuthentication Subsystem 129 such as biometric authentication, RFIDauthentication, Personal Identification Number entry, or multiples ofthe aforementioned.

In an embodiment, Billing Subsystem 128 supports both pre-paid andpost-paid content billing, which provides extra flexibility for contentfacility providers. The pre-paid billing option reduces the risk ofuncollectible accounts which enables facility providers to offerservices on a global scale. The Billing Subsystem 128 bills all contentrequests in real-time to ensure that services are provided only toinmates with sufficient account balances.

In an embodiment, Billing Subsystem 128 charges a Debit Account. Theresident can load funds onto the Debit Account in person, for example ata commissary, by electronic means, or by telephone. Funds can be addedto the Debit Account from cash, bank accounts, or credit card accounts.Optionally, non-residents of the secured facility can be allowed to addfunds to the resident's Debit Account as well.

As another form of payment, an Advance Pay Account can also be chargedby Billing Subsystem 128. The Advance Pay Account can be funded byfamily and friends, and used for call fees associated with the resident.As with the Debit Account, the Billing Subsystem 128 can access theAdvance Pay Account to determine that there are sufficient funds, whencontent is purchased.

In an embodiment, the Billing Subsystem 128 does not immediately deductfunds from an account, but accumulates usage over a billing cycle andforwards a bill to the resident at the end of the billing cycle.Parameters such as the length of the billing cycle, the total amountallowed to be billed during one billing cycle, and the forms of paymentthat the bill can be paid in can be adjusted to suit the needs of aparticular secured facility.

Operation

In operation, a user, such as an inmate, logs into the ControlledEnvironment Media And Communication System 100 through hardware and/orsoftware such as the Inmate Kiosk 200. In an embodiment, the user ispresented with a graphical user interface that prompts the user forauthentication. In an embodiment, the authentication consists of a useridentification and a password. In other embodiments, otherauthentication mechanisms can be used. For example, biometric,fingerprint, facial recognition, hand geometry, voice print, 3D facialrecognition, radio frequency identification, or combinations or othersuch personal authentication means can be used.

In an embodiment, the user, such as an inmate, uses a graphical userinterface and a menu system to select communications services to utilizeor consume through the Inmate Kiosk 200. Channel selection will beaccomplished by using the mouse to scroll and click a selection or thekeyboard up/down arrows and enter key. Touch screen controls areavailable for hardware systems, such as tablets and smart portabledevices. The inmate can also utilize the menu system to invoke the VideoVisitation Subsystem 117 and the Intra-Facility Communication Subsystem121 as well.

During use, the Inmate Kiosk 200 can optionally provide the user withthe ability to minimize the picture of playing media to a smaller frameto allow multiple window viewing to the offender simultaneously whilemaintaining its aspect ratio. This allows offenders to perform functionssuch as offender email while viewing TV.

CONCLUSION

It is to be appreciated that the Detailed Description section, and notthe Abstract section, is intended to be used to interpret the claims.The Abstract section may set forth one or more, but not all exemplaryembodiments, and thus, is not intended to limit the disclosure and theappended claims in any way.

The invention has been described above with the aid of functionalbuilding blocks illustrating the implementation of specified functionsand relationships thereof. The boundaries of these functional buildingblocks have been arbitrarily defined herein for the convenience of thedescription. Alternate boundaries may be defined so long as thespecified functions and relationships thereof are appropriatelyperformed.

It will be apparent to those skilled in the relevant art(s) that variouschanges in form and detail can be made therein without departing fromthe spirit and scope of the disclosure. Thus, the invention should notbe limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

What is claimed is:
 1. A communications platform for providing a videovisitation session to an inmate of a controlled environment facility,the communications platform comprising: a transceiver; a memory thatstores recording data associated with the video visitation session; arouter configured to route video visitation transmissions associatedwith the video visitation session between a communications deviceassociated with the inmate and an outside network via the transceiver; amonitoring subsystem configured to record, store and review the videovisitation session; and one or more processors configured to: receive aconfidentiality flag that identifies whether the video visitationsession is confidential, wherein the confidentiality flag is based onthe communications device; in response to the confidentiality flagindicating that the video visitation session is not confidential,causing the video visitation transmissions to pass through themonitoring subsystem for recording and analysis; and in response to theconfidentiality flag indicating that the video visitation session isconfidential, causing the video visitation transmissions to bypass themonitoring subsystem.
 2. The communications platform of claim 1, whereinthe monitoring subsystem includes at least one investigativeworkstation.
 3. The communications platform of claim 1, wherein theconfidentiality flag is received from a participant of the videovisitation session.
 4. The communications platform of claim 1, furthercomprising a scheduling subsystem, wherein the confidentiality flag isreceived from the scheduling subsystem.
 5. The communications platformof claim 1, wherein the confidentiality flag is received from a localaccess point.
 6. The communications platform of claim 5, wherein thelocal access point is associated with a video visitation kioskdesignated for confidential communications.
 7. The communicationsplatform of claim 1, wherein the monitoring subsystem is configured toperform automatic live monitoring of the video visitation sessiontransparently to participants of the video visitation session.
 8. Amethod for providing a video visitation session to an inmate of acontrolled environment facility, the method comprising: receiving videovisitation transmissions associated with the video visitation sessionfrom one of an inmate device associated with the inmate or an outsidedevice associated with an outside party; receiving a confidentialityflag that identifies whether the video visitation session isconfidential or non-confidential, wherein the confidentiality flag isbased on the inmate device; routing the video visitation transmissionsbetween the inmate device and the outside device through a monitoringsystem for recording, storing, and reviewing the video visitationtransmission in response to the confidentiality flag identifying thevideo visitation session as non-confidential; and bypassing themonitoring system in response to the confidentiality flag identifyingthe video visitation session as confidential.
 9. The method of claim 8,further comprising recording and storing the video visitationtransmissions routed through the monitoring system.
 10. The method ofclaim 8, wherein the confidentiality flag is received from a participantof the video visitation session.
 11. The method of claim 8, wherein theconfidentiality flag is received from a scheduling subsystem.
 12. Themethod of claim 8, wherein the confidentiality flag is received from alocal access point.
 13. The method of claim 12, wherein the local accesspoint is associated with a video visitation kiosk designated forconfidential communications.
 14. The method of claim 8, furthercomprising automatically live monitoring, by the monitoring system, thevideo visitation session designated as non-confidential, wherein thelive monitoring is performed transparently to participants of the videovisitation session.
 15. A video visitation device for providing videovisitation services to an inmate of a controlled environment facility,the video visitation device comprising: a memory; and one or moreprocessors configured to: receive video visitation transmission datafrom an audio input device and a video capture device associated withthe video visitation session from one of an inmate device associatedwith the inmate or an outside device associated with an outside party;receive a confidentiality flag that identifies whether the videovisitation session is confidential or non-confidential, wherein theconfidentiality flag is based on the inmate device; route the videovisitation transmissions between the inmate device and the outsidedevice through a monitoring system for recording, storing and reviewingthe video visitation transmissions in response to the confidentialityflag identifying the video visitation session as non-confidential; andbypass the monitoring system in response to the confidentiality flagidentifying the video visitation session as confidential.
 16. The videovisitation device of claim 15, further comprising recording and storingthe video visitation transmissions routed through the monitoring systemin the memory.
 17. The video visitation device of claim 15, wherein theconfidentiality flag is received from a participant of the videovisitation session.
 18. The video visitation device of claim 15, whereinthe confidentiality flag is received from a scheduling subsystem. 19.The video visitation device of claim 15, wherein the confidentialityflag is received from a local access point.
 20. The video visitationdevice of claim 19, wherein the local access point is associated with avideo visitation kiosk designated for confidential communications.